Security Policy Enforcement by Automated Program-rewriting
نویسنده
چکیده
ions are star-free ω-regular expressions [Lad77, Tho79] with variables and intersection. In general, deciding subset for such a language is intractable, but not every history abstraction expression can appear in practice. Our implementation of Mobile decides subset for a sub-language of the language of history abstractions. We present this sub-language below, we argue that it captures most of the useful history abstractions that can appear in practice, and we prove that subset over this language can be reduced to subset over the language of regular expressions. D.1 History Variables and Intersection Intersection is introduced into a history abstraction during type-checking by typing rule 3.33 (the typing rule for condst). In our implementation, this typing rule substitutes an expression of the form θ ∩ H for each occurrence of variable θ, where H is a closed history abstraction. Since intersection is introduced in no other way, this reduces the language of history abstractions of interest to the following sub-language of the language given in Figure 3.2: H ::= | e |H1H2 |H1 ∪H2 |H | V V ::= θ | V ∩ C C ::= | e | C1C2 | C1 ∪ C2 | C
منابع مشابه
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language
Runtime security policy enforcement systems are crucial to limit the risks associated with running untrustworthy (malicious or buggy) code. The inlined reference monitor approach to policy enforcement, pioneered by Erlingsson and Schneider, implements runtime enforcement through program rewriting: security checks are inserted inside untrusted programs. Ensuring complete mediation – the guarante...
متن کاملA Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language: Extended version
Runtime security policy enforcement systems are crucial to limit the risks associated with running untrustworthy (malicious or buggy) code. The inlined reference monitor approach to policy enforcement, pioneered by Erlingsson and Schneider, implements runtime enforcement through program rewriting: security checks are inserted inside untrusted programs. Ensuring complete mediation – the guarante...
متن کاملUsing Edit Automata for Rewriting-Based Security Enforcement
Execution monitoring (EM) is a widely adopted class of security mechanisms. EM-enforceable security properties are usually characterized by security automata and their derivatives. However Edit automata (EA) have been recently proposed to specify more powerful EMs. Being able to feign the execution of sensitive program actions, these EMs are supposed to enforce more security properties. However...
متن کاملSecure Optimization of Inlined Reference Monitors
Inlined Reference Monitor (IRM) is the preferred enforcement mechanism for historybased access control policies. IRM enforcement injects monitoring code into the binary of an untrusted program in order to track its execution history. The injected code denies access when execution deviates from the policy. The viability of IRM enforcement is predicated on the ability of the binary rewriting elem...
متن کاملEfficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement
Stateful security policies—which specify restrictions on behavior in terms of temporal safety properties—are a powerful tool for administrators to control the behavior of untrusted programs. However, the runtime overhead required to enforce them on real programs can be high. This paper describes a technique for rewriting programs to incorporate runtime checks so that all executions of the resul...
متن کاملRewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values
Program rewriting is defined as transforming a given program into one satisfying some intended properties. This technique has recently been suggested as a means for enforcing security policies. In this paper, we propose rewriting mechanisms based on program dependence graphs to enforce noninterference in programs with observable intermediate values. We first formulate progress-insensitive and p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006