Producing Hook Placements to Enforce Expected Access Control Policies

نویسندگان

  • Divya Muthukumaran
  • Nirupama Talele
  • Trent Jaeger
  • Gang Tan
چکیده

Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control access to resources, authorization hooks are placed before operations on those resources. Moreover, manual hook placements by programmers are often incomplete or incorrect, leading to insecure programs. We advocate an approach that automatically identifies the set of program locations to place authorization hooks. The set of hooks completely mediates all security-sensitive operations in order to enforce expected access control policies at deployment. However, one challenge is that programmers often want to minimize the effort of writing such policies. In this paper, we show how static and dynamic analysis may be applied to help programmers iteratively derive a constraint system for the expected access control policies that enables removal of unnecessary hooks. These authorization constraints reduce the space of allowable access control policies; i.e., those policies that are compatible with the constraints. We further propose algorithms that compute a minimal authorization hook placement based on a set of authorization constraints automatically. We have built a tool that implements this authorization hook placement method, demonstrating how programmers can produce authorization hooks for real-world programs and leverage policy goal-specific constraint selectors to automatically identify many authorization constraints. Our experiments show that our technique reduces manual programmer effort by as much as 67% and produce placements that reduce the amount of policy specification by as much as 36%.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

AFRL-OSR-VA-TR-2015-0149 Information Flow Integrity for Systems of Independently-Developed Components

The aim of this project is to enable enforcement of integrity safe in systems of independently-developed components. In this project, we explore this problem from three perspectives. First, we developed integrity safety properties and mechanisms to enforce them. In particular, we developed resource retrieval (access) integrity, which protects programs when retrieving system resources, and imple...

متن کامل

An access control framework for security policies with complex constraints

Most of current access control systems are not expressive enough for current applications, in the sense that they cannot express several access control policies required by them. Most of these applications have no choice but to build their owned very specific access control systems completely independently from other applications running on the same environment, which entails potential incohere...

متن کامل

Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code

This thesis evaluates the use of a loadtime metaobject protocol as a practical mechanism for enforcing access control policies upon applications distributed as user-level compiled code. Enforcing access control policies upon user-level compiled code is necessary because there are many situations where users are vulnerable to security breaches because they download and run potentially untrustwor...

متن کامل

FileWall: Implementing File Access Policies using Dynamic Access Context

FileWall is a file access control framework that allows file system administrators to enforce file access policies based on dynamic access context such as access history, environment, etc. Similar to a firewall, which interposes on a network path and operates on packets to enforce network access policies, FileWall interposes on a client-server path and operates on network file system messages t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015