Iterative enforcement by suppression: Towards practical enforcement theories

被引:6
|
作者
Bielova, Nataliia [1 ]
Massacci, Fabio [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Runtime enforcement; execution monitors; edit automata;
D O I
10.3233/JCS-2011-0431
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be "good" but not how far the bad execution should be changed. So we cannot formally distinguish between an enforcement mechanism that makes a small change and one that drops the whole execution. In this paper we explore a set of policies called iterative properties that revises the notion of good executions in terms of repeated iterations. We propose an enforcement mechanism that can deal with bad executions (and not only the good ones) in a more predictable way by eliminating bad iterations.
引用
收藏
页码:51 / 79
页数:29
相关论文
共 50 条
  • [41] Controlling Interactions with Libraries in Android Apps Through Runtime Enforcement
    Riganelli, Oliviero
    Micucci, Daniela
    Mariani, Leonardo
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2019, 14 (02)
  • [42] Execution monitoring enforcement under memory-limitation constraints
    Talhi, Chamseddine
    Tawbi, Nadia
    Debbabi, Mourad
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 158 - 184
  • [43] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [44] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [45] Security policies enforcement using finite and pushdown edit automata
    Danièle Beauquier
    Joëlle Cohen
    Ruggero Lanotte
    International Journal of Information Security, 2013, 12 : 319 - 336
  • [46] Security policies enforcement using finite and pushdown edit automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 319 - 336
  • [47] Using Edit Automata for Rewriting-Based Security Enforcement
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 175 - +
  • [48] Adaptive Industrial Control Systems via IEC 61499 and Runtime Enforcement
    Faqrizal, Irman
    Salaün, Gwen
    Falcone, Yliès
    ACM Transactions on Autonomous and Adaptive Systems, 2024, 19 (04)
  • [49] AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications
    Backes, Michael
    Gerling, Sebastian
    Hammer, Christian
    Maffei, Matteo
    von Styp-Rekowsky, Philipp
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 213 - 231
  • [50] Compositional runtime enforcement of safety and co-safety timed properties
    Shankar, Saumya
    Pinisetty, Srinivas
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2025,