Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies

被引:1
作者
Rubio-Medrano, Carlos E. [1 ]
Claramunt, Luis [1 ]
Jogani, Shaishavkumar [1 ]
Ahn, Gail-Joon [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2020年
基金
美国国家科学基金会;
关键词
Attribute-based Access Control; Risk Management; Attribute Forgery; Policy Bypassing; Zero-Day Vulnerabiities;
D O I
10.1145/3381991.3395615
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the use of well-defined, security-relevant pieces of run-time information, a.k.a., attributes, has emerged as a convenient paradigm for writing, enforcing, and maintaining authorization policies, allowing for extended flexibility and convenience. However, attackers may try to bypass such policies, along with their enforcement mechanisms, by maliciously forging the attributes listed on them, e.g., by compromising the attribute sources: operative systems, software modules, remote services, etc., thus gaining unintended access to protected resources as a result. In such a context, performing a proper risk assessment of authorization policies, taking into account their inner structure: rules, attributes, combining algorithms, etc., along with their corresponding sources, becomes highly convenient to overcome zero-day vulnerabilities, before they can be later exploited by attackers. With this in mind, we introduce RiskPol, an automated risk assessment framework for authorization policies, which, besides being inspired by well-established techniques for vulnerability analysis such as symbolic execution, also introduces the very first approach for proactively assessing risks in the context of a series of attacks based on unintended attribute manipulation via forgery. We validate our approach by resorting to a set of case studies we performed on both real-life policies originally written in the English language, as well as a set of policies obtained from the literature, which show not only the convenience of our approach for risk assessment, but also reveal that some of those policies are vulnerable to attribute-forgery attacks by just compromising one or two of their attributes.
引用
收藏
页码:131 / 144
页数:14
相关论文
共 34 条
[1]  
[Anonymous], 2000, Can We Trust Trust?
[2]  
AT&T, 2020, XACML 3 0
[3]   A unified framework for risk and vulnerability analysis covering both safety and security [J].
Aven, Terje .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (06) :745-754
[4]  
Bijon K. Z., 2012, RISK AW RBAC SESS SP
[5]  
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
[6]  
Brossard D., 2017, P 2 ACM WORKSHOP ATT, P53, DOI [DOI 10.1145/3041048.3041051, 10.1145/3041048.3041051]
[7]  
Campbell K., 2003, Journal of Computer Security, V11, P431
[8]  
Chapin P., 2005, P 2005 ACM WORKSH FO, P33
[9]   XACML and Risk-Aware Access Control [J].
Chen, Liang ;
Gasparini, Luca ;
Norman, Timothy J. .
WOSIS: PROCEEDINGS OF THE 10TH INTERNATIONAL WORKSHOP ON SECURITY IN INFORMATION SYSTEMS, 2013, :66-75
[10]   A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems [J].
Choi, Donghee ;
Kim, Dohoon ;
Park, Seog .
COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015