Iterative enforcement by suppression: Towards practical enforcement theories

被引:6
|
作者
Bielova, Nataliia [1 ]
Massacci, Fabio [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Runtime enforcement; execution monitors; edit automata;
D O I
10.3233/JCS-2011-0431
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be "good" but not how far the bad execution should be changed. So we cannot formally distinguish between an enforcement mechanism that makes a small change and one that drops the whole execution. In this paper we explore a set of policies called iterative properties that revises the notion of good executions in terms of repeated iterations. We propose an enforcement mechanism that can deal with bad executions (and not only the good ones) in a more predictable way by eliminating bad iterations.
引用
收藏
页码:51 / 79
页数:29
相关论文
共 50 条
  • [1] Comparing controlled system synthesis and suppression enforcement
    Luca Aceto
    Ian Cassar
    Adrian Francalanza
    Anna Ingólfsdóttir
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 601 - 614
  • [2] Comparing controlled system synthesis and suppression enforcement
    Aceto, Luca
    Cassar, Ian
    Francalanza, Adrian
    Ingolfsdottir, Anna
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (04) : 601 - 614
  • [3] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451
  • [4] Runtime enforcement monitors: composition, synthesis, and enforcement abilities
    Yliès Falcone
    Laurent Mounier
    Jean-Claude Fernandez
    Jean-Luc Richier
    Formal Methods in System Design, 2011, 38 : 223 - 262
  • [5] Runtime enforcement monitors: composition, synthesis, and enforcement abilities
    Falcone, Ylies
    Mounier, Laurent
    Fernandez, Jean-Claude
    Richier, Jean-Luc
    FORMAL METHODS IN SYSTEM DESIGN, 2011, 38 (03) : 223 - 262
  • [6] Decentralized LTL Enforcement
    Gallay, Florian
    Falcone, Ylies
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (346): : 135 - 151
  • [7] Predictive runtime enforcement
    Pinisetty, Srinivas
    Preoteasa, Viorel
    Tripakis, Stavros
    Jeron, Thierry
    Falcone, Ylies
    Marchand, Herve
    FORMAL METHODS IN SYSTEM DESIGN, 2017, 51 (01) : 154 - 199
  • [8] Predictive runtime enforcement
    Srinivas Pinisetty
    Viorel Preoteasa
    Stavros Tripakis
    Thierry Jéron
    Yliès Falcone
    Hervé Marchand
    Formal Methods in System Design, 2017, 51 : 154 - 199
  • [9] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [10] Compositional runtime enforcement revisited
    Srinivas Pinisetty
    Ankit Pradhan
    Partha Roop
    Stavros Tripakis
    Formal Methods in System Design, 2021, 59 : 205 - 252