Edit automata: Enforcement mechanisms for run-time security policies

被引:0
|
作者
Ligatti J. [1 ]
Bauer L. [2 ]
Walker D. [1 ]
机构
[1] Princeton University, Princeton, NJ
[2] Carnegie Mellon University, Pittsburgh, PA
关键词
Classification of security policies; Language-based security; Run-time checking and monitoring; Security automata;
D O I
10.1007/s10207-004-0046-8
中图分类号
学科分类号
摘要
We analyze the space of security policies that can be enforced by monitoring and modifying programs at run time. Our program monitors, called edit automata, are abstract machines that examine the sequence of application program actions and transform the sequence when it deviates from a specified policy. Edit automata have a rich set of transformational powers: they may terminate an application, thereby truncating the program action stream; they may suppress undesired or dangerous actions without necessarily terminating the program; and they may also insert additional actions into the event stream. After providing a formal definition of edit automata, we develop a rigorous framework for reasoning about them and their cousins: truncation automata (which can only terminate applications), suppression automata (which can terminate applications and suppress individual actions), and insertion automata (which can terminate and insert). We give a set-theoretic characterization of the policies each sort of automaton can enforce, and we provide examples of policies that can be enforced by one sort of automaton but not another. © Springer-Verlag 2004.
引用
收藏
页码:2 / 16
页数:14
相关论文
共 50 条
  • [1] On run-time enforcement of policies
    Shah, Harshit
    Shyamasundar, R. K.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 268 - +
  • [2] Security Policies Enforcement Using Finite Edit Automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 229 (03) : 19 - 35
  • [3] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [4] Security policies enforcement using finite and pushdown edit automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 319 - 336
  • [5] Security policies enforcement using finite and pushdown edit automata
    Danièle Beauquier
    Joëlle Cohen
    Ruggero Lanotte
    [J]. International Journal of Information Security, 2013, 12 : 319 - 336
  • [6] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [7] Analysis and run-time verification of dynamic security policies
    Janicke, Helge
    Siewe, Frangois
    Jones, Kevin
    Cau, Antonio
    Zedan, Hussein
    [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103
  • [8] Using Edit Automata for Rewriting-Based Security Enforcement
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 175 - +
  • [9] Contract representation for run-time monitoring and enforcement
    Molina-Jimenez, C
    Shrivastava, S
    Solaiman, E
    Warne, J
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 103 - 110
  • [10] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451