Runtime Enforcement of Security Policies on Black Box Reactive Programs

被引:0
|
作者
Ngo, Minh [1 ]
Massacci, Fabio [1 ]
Milushev, Dimiter [2 ]
Piessens, Frank [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Katholieke Univ Leuven, iMinds DistriNet, Louvain, Belgium
基金
比利时弗兰德研究基金会;
关键词
Security; Runtime Enforcement; Hypersafety Policy; Black Box Mechanism; Reactive Program;
D O I
10.1145/2775051.2676978
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different strengths and weaknesses and hence it is important to understand the qualities of various enforcement mechanisms. This paper studies runtime enforcement mechanisms for reactive programs. We study the impact of two important constraints that many practical enforcement mechanisms satisfy: (1) the enforcement mechanism must handle each input/output event in finite time and on occurrence of the event (as opposed to for instance Ligatti's edit automata that have the power to buffer events for an arbitrary amount of time), and (2) the enforcement mechanism treats the untrusted program as a black box: it can monitor and/or edit the input/output events that the program exhibits on execution and it can explore alternative executions of the program by running additional copies of the program and providing these different inputs. It can not inspect the source or machine code of the untrusted program. Such enforcement mechanisms are important in practice: they include for instance many execution monitors, virtual machine monitors, and secure multi-execution or shadow executions. We establish upper and lower bounds for the class of policies that are enforceable by such black box mechanisms, and we propose a generic enforcement mechanism that works for a wide range of policies. We also show how our generic enforcement mechanism can be instantiated to enforce specific classes of policies, at the same time showing that many existing enforcement mechanisms are optimized instances of our construction.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 50 条
  • [21] The specification and enforcement of advanced security policies
    Ryutov, T
    Neuman, C
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 128 - 138
  • [22] Formal and efficient enforcement of security policies
    Langar, A
    Mejri, M
    FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 143 - 149
  • [23] Probabilistic cost enforcement of security policies
    Mallios, Yannis
    Bauer, Lujo
    Kaynar, Dilsun
    Martinelli, Fabio
    Morisset, Charles
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 759 - 787
  • [24] SASI enforcement of security policies: A retrospective
    Erlingsson, U
    Schneider, FB
    NEW SECURITY PARADIGM WORKSHOP, PROCEEDINGS, 2000, : 87 - 95
  • [25] On the Runtime Enforcement of Evolving Privacy Policies in Online Social Networks
    Pace, Gordon J.
    Pardo, Raul
    Schneider, Gerardo
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 : 407 - 412
  • [26] Probabilistic Cost Enforcement of Security Policies
    Mallios, Yannis
    Bauer, Lujo
    Kaynar, Dilsun
    Martinelli, Fabio
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 144 - 159
  • [27] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [28] PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
    Tabiban, Azadeh
    Majumdar, Suryadipta
    Wang, Lingyu
    Debbabi, Mourad
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [29] Enforcing Security Policies on Programs
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2006, 147 : 195 - +
  • [30] Security Aspects: A Framework for Enforcement of Security Policies using AOP
    Ayed, Samiha
    Idrees, Muhammad Sabir
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Pinto, Monica
    Fuentes, Lidia
    2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 301 - 308