Runtime Enforcement of Information Flow Security in Tree Manipulating Processes

被引:0
|
作者
Kovacs, Mate [1 ]
Seidl, Helmut [1 ]
机构
[1] Tech Univ Munich, D-8000 Munich, Germany
来源
ENGINEERING SECURE SOFTWARE AND SYSTEMS | 2012年 / 7159卷
关键词
Semi-structured data; information flow control; runtime enforcement; CALCULUS; BPEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of enforcing information flow policies in XML manipulating programs such as Web services and business processes implemented in current workflow languages. We propose a runtime monitor that can enforce the secrecy of freely chosen subtrees of the data throughout the execution. The key idea is to apply a generalized constant propagation for computing the public effect of branching constructs whose conditions may depend on the secret. This allows for a better precision than runtime monitors which rely on tainting of variables or nodes alone. We demonstrate our approach for a minimalistic tree manipulating programming language and prove its correctness w.r.t. the concrete semantics of programs.
引用
收藏
页码:46 / 59
页数:14
相关论文
共 50 条
  • [21] Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement
    Majumdar, Suryadipta
    Tabiban, Azadeh
    Mohammady, Meisam
    Oqaily, Alaa
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 239 - 262
  • [22] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [23] Authorization Constraint Enforcement for Information System Security
    Hewett, Rattikorn
    Kijsanayothin, Phongphun
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 3501 - 3506
  • [24] INFORMATION FLOW OF TREE (Ⅰ)Tree Flow Theorems
    李传湘
    Acta Mathematica Scientia, 1981, (02) : 240 - 256
  • [25] INFORMATION FLOW OF TREE (2) Tree Flow Equations
    李传湘
    数学物理学报, 1982, (01) : 111 - 124
  • [26] INFORMATION FLOW OF TREE (1) Tree Flow Theorems
    李传湘
    数学物理学报, 1981, (02) : 240 - 256
  • [27] Cybercrime: law enforcement, security and surveillance in the information age
    Barrett, D
    JOURNAL OF SOCIAL POLICY, 2001, 30 : 177 - 179
  • [28] Language Based Information Routing Security: Policy Enforcement
    Oreku, George
    Li, Jianzhong
    Mtenzi, Fredrick
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2009, 6 (01) : 91 - 98
  • [29] Enforcement of opacity security properties for ship information system
    Xing, Bowen
    Dai, Jin
    Liu, Sheng
    INTERNATIONAL JOURNAL OF NAVAL ARCHITECTURE AND OCEAN ENGINEERING, 2016, 8 (05) : 423 - 433
  • [30] Permissive runtime information flow control in the presence of exceptions
    Bichhawat, Abhishek
    Rajani, Vineet
    Garg, Deepak
    Hammer, Christian
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (04) : 361 - 401