Equivalence-preserving corrective enforcement of security properties

作者: Raphaël Khoury , Nadia Tawbi

DOI: 10.1504/IJICS.2015.073011

关键词: Field (computer science)Order (exchange)EnforcementComputer securityCode (cryptography)Equivalence relationSet (abstract data type)Security policyComputer scienceEquivalence (measure theory)

摘要: Runtime monitoring is a widely used approach for the enforcement of security policies. It allows safe execution untrusted code by observing and reacting if needed to prevent violation user-defined policy. Previous studies have determined that set properties enforceable monitors greatly extended giving monitor some licence transform its target execution. In this study, we present new framework model study behaviour such monitors. order assure meaningful, bound monitor's ability restriction stating any transformation must preserve equivalence between input output. We proceed examples meaningful relations identify policies are with their use. also relate our work previous in field. Finally, investigate how an priori knowledge program's would increase power.

参考文章(41)
Grigore Rosu, Marcelo d'Amorim, Efficient Monitoring of omega-Languages. computer aided verification. pp. 364- 378 ,(2005)
Mahjoub Langar, Mohamed Mejri, Formal and Efficient Enforcement of Security Policies. FCS. pp. 143- 149 ,(2005)
M. Langar, Y. Funyu, M. Mejri, H. Fujita, T. Mechri, Automatic Enforcement of Security in Computer Networks new trends in software methodologies, tools and techniques. pp. 200- 222 ,(2007)
Mahjoub Langar, Mohamed Mejri, Kamel Adi, A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management. pp. 165- 171 ,(2007)
Andreas Bauer, Martin Leucker, Christian Schallhart, Monitoring of real-time properties foundations of software technology and theoretical computer science. ,vol. 4337, pp. 260- 272 ,(2006) , 10.1007/11944836_25
Orna Kupferman, Moshe Y. Vardi, Model Checking of Safety Properties formal methods. ,vol. 19, pp. 291- 314 ,(2001) , 10.1023/A:1011254632723
Sampath Kannan, Mahesh Viswanathan, Insup Lee, Foundations for the run-time analysis of software systems University of Pennsylvania. ,(2000)
Apostolos Syropoulos, Mathematics of Multisets WMP '00 Proceedings of the Workshop on Multiset Processing: Multiset Processing, Mathematical, Computer Science, and Molecular Computing Points of View. pp. 347- 358 ,(2000) , 10.1007/3-540-45523-X_17
Hugues Chabot, Raphael Khoury, Nadia Tawbi, Generating In-Line Monitors for Rabin Automata nordic conference on secure it systems. pp. 287- 301 ,(2009) , 10.1007/978-3-642-04766-4_20
Nataliia Bielova, Fabio Massacci, Andrea Micheletti, Towards Practical Enforcement Theories nordic conference on secure it systems. pp. 239- 254 ,(2009) , 10.1007/978-3-642-04766-4_17