2010
DOI: 10.1007/978-3-642-15497-3_6
|View full text |Cite
|
Sign up to set email alerts
|

A Theory of Runtime Enforcement, with Results

Abstract: Abstract. This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and their results. Because previous work could not model monitors transforming results, MRAs capture realistic behaviors outside the scope of previous models. MRAs also have a simple but realistic operational semantics that makes it straightforward to define concrete MRAs. Moreover, the definitions of policies and enforcement … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(43 citation statements)
references
References 17 publications
0
43
0
Order By: Relevance
“…Khoury and Tawbi [15,16] and Bielova et al [7,5,6] further refine the notion of enforcement by suggesting alternative definitions of enforcement. In [23] Ligatti and Reddy introduced an alternative model, the mandatory-result automaton. This model distinguishes between the action set of the target and that of the system with which it interacts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Khoury and Tawbi [15,16] and Bielova et al [7,5,6] further refine the notion of enforcement by suggesting alternative definitions of enforcement. In [23] Ligatti and Reddy introduced an alternative model, the mandatory-result automaton. This model distinguishes between the action set of the target and that of the system with which it interacts.…”
Section: Related Workmentioning
confidence: 99%
“…In that case, the monitor's enforcement is bounded by the reverse subword equivalence, meaning that the monitor's output is a subword of the original sequence. This enforcement paradigm is similar to the one described in [23], where the monitor is interposed between the target program and the system. Any action requested by the target program is intercepted by the monitor which must accept or reject it, and allows us to pose an upper bound to this enforcement paradigm.…”
Section: Suppression Enforcementmentioning
confidence: 99%
“…The works on "enforceable security properties" [10,9] treat states as abstract objects, without indicating implementations. Advanced discretionary access control based on logic programming, like the Flexible Authorization Framework [8] maintains a special "done-predicate", which can be seen as a kind of a user log or as a kind of a dynamic component of the access control policy, depending on the point of view.…”
Section: Related Work Extensions and Conclusionmentioning
confidence: 99%
“…In Runtime Enforcement (RE) [16,25,26] the system behaviour is kept in line with the correctness requirement by anticipating incorrect behaviour and countering it before it actually happens. In RE the monitor is typically designed to act as a proxy which wraps around the system and analyses its external interactions (see the dotted-line in Figure 1c).…”
Section: Monitormentioning
confidence: 99%
“…In RE the monitor is typically designed to act as a proxy which wraps around the system and analyses its external interactions (see the dotted-line in Figure 1c). The monitor is thus able to either drop incorrect events generated by the system, or add system events by executing actions on behalf of the system [25,26]. This contrasts with runtime adaptation, where monitors may allow violations to occur but then execute remedial actions to mitigate the effects of the violation.…”
Section: Monitormentioning
confidence: 99%