Runtime Enforcement of Security Policies on Black Box Reactive Programs

被引:0
|
作者
Ngo, Minh [1 ]
Massacci, Fabio [1 ]
Milushev, Dimiter [2 ]
Piessens, Frank [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Katholieke Univ Leuven, iMinds DistriNet, Louvain, Belgium
基金
比利时弗兰德研究基金会;
关键词
Security; Runtime Enforcement; Hypersafety Policy; Black Box Mechanism; Reactive Program;
D O I
10.1145/2775051.2676978
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different strengths and weaknesses and hence it is important to understand the qualities of various enforcement mechanisms. This paper studies runtime enforcement mechanisms for reactive programs. We study the impact of two important constraints that many practical enforcement mechanisms satisfy: (1) the enforcement mechanism must handle each input/output event in finite time and on occurrence of the event (as opposed to for instance Ligatti's edit automata that have the power to buffer events for an arbitrary amount of time), and (2) the enforcement mechanism treats the untrusted program as a black box: it can monitor and/or edit the input/output events that the program exhibits on execution and it can explore alternative executions of the program by running additional copies of the program and providing these different inputs. It can not inspect the source or machine code of the untrusted program. Such enforcement mechanisms are important in practice: they include for instance many execution monitors, virtual machine monitors, and secure multi-execution or shadow executions. We establish upper and lower bounds for the class of policies that are enforceable by such black box mechanisms, and we propose a generic enforcement mechanism that works for a wide range of policies. We also show how our generic enforcement mechanism can be instantiated to enforce specific classes of policies, at the same time showing that many existing enforcement mechanisms are optimized instances of our construction.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 50 条
  • [31] Enforcement of Security Properties for Dynamic MAC Policies
    Briffaut, J.
    Lalande, J. -F.
    Toinard, C.
    Blanc, M.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 114 - +
  • [32] Which security policies are enforceable by runtime monitors? A survey
    Khoury, Raphael
    Tawbi, Nadia
    COMPUTER SCIENCE REVIEW, 2012, 6 (01) : 27 - 45
  • [33] Formal enforcement of security policies on concurrent systems
    Langar, Mahjoub
    Mejri, Mohamed
    Adi, Kamel
    JOURNAL OF SYMBOLIC COMPUTATION, 2011, 46 (09) : 997 - 1016
  • [34] Trust-based enforcement of security policies
    Vigo, Roberto
    Celestini, Alessandro
    Tiezzi, Francesco
    De Nicola, Rocco
    Nielson, Flemming
    Nielson, Hanne Riis
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8902 : 176 - 191
  • [35] Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF
    Gwak, Songi
    Doan, Thien-Phuc
    Jung, Souhwan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 1773 - 1786
  • [36] CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites
    Pan, Xiang
    Cao, Yinzhi
    Liu, Shuangping
    Zhou, Yu
    Chen, Yan
    Zhou, Tingzhe
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 653 - 665
  • [37] Child support enforcement: Programs and policies, impacts and questions
    Pirog, M. A.
    Ziol-Guest, K. M.
    JOURNAL OF POLICY ANALYSIS AND MANAGEMENT, 2006, 25 (04) : 943 - 990
  • [38] Decentralized Enforcement of Security Policies for Distributed Computational Systems
    Orlovsky, Arie
    Raz, Danny
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 241 - 248
  • [39] Using Equivalence Relations for Corrective Enforcement of Security Policies
    Khoury, Raphael
    Tawbi, Nadia
    COMPUTER NETWORK SECURITY, 2010, 6258 : 139 - 154
  • [40] Dynamic Enforcement of Knowledge-based Security Policies
    Mardziel, Piotr
    Magill, Stephen
    Hicks, Michael
    Srivatsa, Mudhakar
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 114 - 128