The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2010
DOI: 10.1007/978-3-642-11957-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Automating Security Mediation Placement

Abstract: Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive security policy mediation. Resolving such type errors requires selecting a placement of mediation statements that implement runtime security decisions, such as declassifiers and authorization checks. Manually placing mediation statements in legacy code can be difficult, as there may be several, interacting type errors. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 28 publications
(26 reference statements)
0
17
0
Order By: Relevance
“…Given available security policies, we claim that building system-wide infor- mation flow problems can be largely automated, resulting a similar effort as configuring information flow problems for single entities (programs or MAC policies). We design an automated method to produce mediator placements from such problems that is an extension of the basic graph cut idea [37,19] to address general lattices and constrained mediators.…”
Section: Designmentioning
confidence: 99%
See 3 more Smart Citations
“…Given available security policies, we claim that building system-wide infor- mation flow problems can be largely automated, resulting a similar effort as configuring information flow problems for single entities (programs or MAC policies). We design an automated method to produce mediator placements from such problems that is an extension of the basic graph cut idea [37,19] to address general lattices and constrained mediators.…”
Section: Designmentioning
confidence: 99%
“…Researchers had the insight that placing a mediator to resolve information flow errors for a lattice policy containing two levels li and lj is tantamount to generating an edge cut 4 of the data flow graph with the nodes mapped to li as the sources and the nodes mapped to lj as the sinks [37,19]. This property is called Cut-Mediation Equivalence.…”
Section: Computing Minimal Mediationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, building either attack trees or attack graphs currently requires knowledge about the likely vulnerabilities on individual hosts, which may be incomplete (i.e., previously-unknown vulnerabilities may be missed) and brittle (i.e., vulnerabilities may be patched). Alternatively, researchers have developed methods to place security monitoring to block or limit adversary access to prevent attacks based on classical problems [27,30,17]. These methods focus on only one layer of the system, such as the network, a single host, or a single program because the size of the graphs becomes prohibitive.…”
Section: Introductionmentioning
confidence: 99%