Runtime Enforcement of Security Policies on Black Box Reactive Programs

被引:0
|
作者
Ngo, Minh [1 ]
Massacci, Fabio [1 ]
Milushev, Dimiter [2 ]
Piessens, Frank [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Katholieke Univ Leuven, iMinds DistriNet, Louvain, Belgium
基金
比利时弗兰德研究基金会;
关键词
Security; Runtime Enforcement; Hypersafety Policy; Black Box Mechanism; Reactive Program;
D O I
10.1145/2775051.2676978
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different strengths and weaknesses and hence it is important to understand the qualities of various enforcement mechanisms. This paper studies runtime enforcement mechanisms for reactive programs. We study the impact of two important constraints that many practical enforcement mechanisms satisfy: (1) the enforcement mechanism must handle each input/output event in finite time and on occurrence of the event (as opposed to for instance Ligatti's edit automata that have the power to buffer events for an arbitrary amount of time), and (2) the enforcement mechanism treats the untrusted program as a black box: it can monitor and/or edit the input/output events that the program exhibits on execution and it can explore alternative executions of the program by running additional copies of the program and providing these different inputs. It can not inspect the source or machine code of the untrusted program. Such enforcement mechanisms are important in practice: they include for instance many execution monitors, virtual machine monitors, and secure multi-execution or shadow executions. We establish upper and lower bounds for the class of policies that are enforceable by such black box mechanisms, and we propose a generic enforcement mechanism that works for a wide range of policies. We also show how our generic enforcement mechanism can be instantiated to enforce specific classes of policies, at the same time showing that many existing enforcement mechanisms are optimized instances of our construction.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 18 条
  • [1] Runtime Enforcement for Control System Security
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 246 - 261
  • [2] Composing Expressive Runtime Security Policies
    Bauer, Lujo
    Ligatti, Jay
    Walker, David
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2009, 18 (03)
  • [3] Runtime Enforcement of Reactive Systems using Synchronous Enforcers
    Pinisetty, Srinivas
    Roop, Partha S.
    Smyth, Steven
    Tripakis, Stavros
    von Hanxleden, Reinhard
    SPIN'17: PROCEEDINGS OF THE 24TH ACM SIGSOFT INTERNATIONAL SPIN SYMPOSIUM ON MODEL CHECKING OF SOFTWARE, 2017, : 80 - 89
  • [4] Industrial Control Systems Security via Runtime Enforcement
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (01)
  • [5] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [6] Security Aspects: A Framework for Enforcement of Security Policies using AOP
    Ayed, Samiha
    Idrees, Muhammad Sabir
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Pinto, Monica
    Fuentes, Lidia
    2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 301 - 308
  • [7] Decentralized Enforcement of Security Policies for Distributed Computational Systems
    Orlovsky, Arie
    Raz, Danny
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 241 - 248
  • [8] Security Policies Enforcement Using Finite Edit Automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 229 (03) : 19 - 35
  • [9] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [10] Securing programs via modeling and efficient enforcement of access control policies
    Parsa, Saeed
    Damanafshan, Morteza
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2118 - +