Towards Automated Learning of Access Control Policies Enforced by Web Applications

被引:1
作者
Iyer, Padmavathi [1 ]
Masoumzadeh, Amir [1 ]
机构
[1] SUNY Albany, Albany, NY 12222 USA
来源
PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023 | 2023年
基金
美国国家科学基金会;
关键词
policy mining; web application; relationship-based access control; automated; concrete systems;
D O I
10.1145/3589608.3594743
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. This is especially important as many of real-world applications handle a large amount and variety of data objects that may have different applicable policies. We investigate the problem of automated learning of access control policies from web applications. The existing research on mining access control policies has mainly focused on developing algorithms for inferring correct and concise policies from low-level authorization information. However, little has been done in terms of systematically gathering the low-level authorization data and applications' data models that are prerequisite to such a mining process. In this paper, we propose a novel black-box approach to inferring those prerequisites and discuss our initial observations on employing such a framework in learning policies from real-world web applications.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 22 条
[1]  
[Anonymous], 2011, P 1 ACM C DAT APPL S
[2]  
[Anonymous], 2017, Funkwhale
[3]  
[Anonymous], 2004, elgg
[4]  
[Anonymous], 2019, mitmproxy
[5]   A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies [J].
Bui, Thang ;
Stoller, Scott D. .
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, :167-178
[6]   Greedy and evolutionary algorithms for mining relationship-based access control policies [J].
Bui, Thang ;
Stoller, Scott D. ;
Li, Jiajie .
COMPUTERS & SECURITY, 2019, 80 :317-333
[7]   Mining ABAC Rules from Sparse Logs [J].
Cotrini, Carlos ;
Weghorn, Thilo ;
Basin, David .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :31-46
[8]   Path Conditions and Principal Matching: A New Approach to Access Control [J].
Crampton, Jason ;
Sellwood, James .
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, :187-198
[9]   Data Preparation for Mining World Wide Web Browsing Patterns [J].
Robert Cooley ;
Bamshad Mobasher ;
Jaideep Srivastava .
Knowledge and Information Systems, 1999, 1 (1) :5-32
[10]   Black Widow: Blackbox Data-driven Web Scanning [J].
Eriksson, Benjamin ;
Pellegrino, Giancarlo ;
Sabelfeld, Andrei .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :1125-1142