Runtime Enforcement of Security Policies on Black Box Reactive Programs

被引:0
|
作者
Ngo, Minh [1 ]
Massacci, Fabio [1 ]
Milushev, Dimiter [2 ]
Piessens, Frank [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Katholieke Univ Leuven, iMinds DistriNet, Louvain, Belgium
基金
比利时弗兰德研究基金会;
关键词
Security; Runtime Enforcement; Hypersafety Policy; Black Box Mechanism; Reactive Program;
D O I
10.1145/2775051.2676978
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different strengths and weaknesses and hence it is important to understand the qualities of various enforcement mechanisms. This paper studies runtime enforcement mechanisms for reactive programs. We study the impact of two important constraints that many practical enforcement mechanisms satisfy: (1) the enforcement mechanism must handle each input/output event in finite time and on occurrence of the event (as opposed to for instance Ligatti's edit automata that have the power to buffer events for an arbitrary amount of time), and (2) the enforcement mechanism treats the untrusted program as a black box: it can monitor and/or edit the input/output events that the program exhibits on execution and it can explore alternative executions of the program by running additional copies of the program and providing these different inputs. It can not inspect the source or machine code of the untrusted program. Such enforcement mechanisms are important in practice: they include for instance many execution monitors, virtual machine monitors, and secure multi-execution or shadow executions. We establish upper and lower bounds for the class of policies that are enforceable by such black box mechanisms, and we propose a generic enforcement mechanism that works for a wide range of policies. We also show how our generic enforcement mechanism can be instantiated to enforce specific classes of policies, at the same time showing that many existing enforcement mechanisms are optimized instances of our construction.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 50 条
  • [1] Specification and runtime enforcement of security policies
    Jin, Ying
    Zhang, Jing
    Zheng, Xiaojuan
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
  • [2] Runtime Enforcement of Dynamic Security Policies
    Horcas, Jose-Miguel
    Pinto, Monica
    Fuentes, Lidia
    SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 340 - 356
  • [3] Unpacking the "Black Box" of Social Programs and Policies: Introduction
    Solmeyer, Anna R.
    Constance, Nicole
    AMERICAN JOURNAL OF EVALUATION, 2015, 36 (04) : 470 - 474
  • [4] Static enforcement of security in runtime systems
    Pedersen, Mathias, V
    Askarov, Aslan
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 335 - 350
  • [5] Runtime Enforcement for Control System Security
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 246 - 261
  • [6] A modular pipeline for enforcement of security properties at runtime
    Taleb, Rania
    Halle, Sylvain
    Khoury, Raphael
    ANNALS OF TELECOMMUNICATIONS, 2023, 78 (7-8) : 429 - 457
  • [7] An Android runtime security policy enforcement framework
    Hammad Banuri
    Masoom Alam
    Shahryar Khan
    Jawad Manzoor
    Bahar Ali
    Yasar Khan
    Mohsin Yaseen
    Mir Nauman Tahir
    Tamleek Ali
    Quratulain Alam
    Xinwen Zhang
    Personal and Ubiquitous Computing, 2012, 16 : 631 - 641
  • [8] A modular pipeline for enforcement of security properties at runtime
    Rania Taleb
    Sylvain Hallé
    Raphaël Khoury
    Annals of Telecommunications, 2023, 78 : 429 - 457
  • [9] An Android runtime security policy enforcement framework
    Banuri, Hammad
    Alam, Masoom
    Khan, Shahryar
    Manzoor, Jawad
    Ali, Bahar
    Khan, Yasar
    Yaseen, Mohsin
    Tahir, Mir Nauman
    Ali, Tamleek
    Alam, Quratulain
    Zhang, Xinwen
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) : 631 - 641
  • [10] An Android runtime security policy enforcement framework
    Security Engineering Research Group , Institute of Management Sciences, 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan
    不详
    Pers. Ubiquitous Comp., 6 (631-641):