Towards Scalable Defense of Information Flow Security for Distributed Systems

被引:1
作者
Fu, Xiaoqin [1 ]
机构
[1] Washington State Univ, Pullman, WA 99164 USA
来源
PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19) | 2019年
关键词
Information flow; Security; Scalability; Distributed system;
D O I
10.1145/3293882.3338988
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is particularly challenging to defend common distributed systems against security vulnerabilities because of the complexity and their large sizes. However, traditional solutions, that attack the information flow security problem, often fail for large, complex real-world distributed systems due to scalability problems. The problem would be even exacerbated for the online defense of continuously-running systems. My proposed research consists of three connected themes. First, I have developed metrics to help users understand and analyze the security characteristics of distributed systems at runtime in relation to their coupling measures. Then, I have also developed a highly scalable, cost-effective dynamic information flow analysis approach for distributed systems. It can detect implicit dependencies and find real security vulnerabilities in industrial distributed systems with practical portability and scalability. In order to thoroughly solve the scalability problem in general scenarios, I am developing a self-adaptive dynamic dependency analysis framework to monitor security issues during continuous running. In this proposal, I outline the three projects in a related manner as to how they consistently target the central objective of my thesis research.
引用
收藏
页码:438 / 442
页数:5
相关论文
共 20 条
[11]  
Fu Xiaoqin, 2019, IEEE ACM INT C PROGR
[12]   Object-oriented dynamic complexity measures for software understandability [J].
Gosain A. ;
Sharma G. .
Innovations in Systems and Software Engineering, 2017, 13 (2-3) :177-190
[13]  
Li Li, 2015, P 37 INT C SOFTW ENG, V12
[14]  
Myers AC, 2001, Jif: Java information flow
[15]  
Octeau Damien, 2013, P USENIX SEC S
[16]   DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android [J].
Rasthofer, Siegfried ;
Arzt, Steven ;
Lovat, Enrico ;
Bodden, Eric .
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, :40-49
[17]   Dynamic vs. Static Flow-Sensitive Security Analysis [J].
Russo, Alejandro ;
Sabelfeld, Andrei .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :186-199
[18]   Static analysis of object references in RMI-based Java']Java software [J].
Sharp, Mariana ;
Rountev, Atanas .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (09) :664-681
[19]  
Villegas Norha M., 2011, 2011 ICSE S SOFTW EN, P80
[20]   A methodology for architecture-level reliability risk analysis [J].
Yacoub, SM ;
Ammar, HH .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (06) :529-547