2002
DOI: 10.1016/s1571-0661(04)80578-4
|View full text |Cite
|
Sign up to set email alerts
|

Computational Analysis of Run-time Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
31
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(31 citation statements)
references
References 4 publications
0
31
0
Order By: Relevance
“…Past research claimed to equate the enforcement power of truncation automata with the set of computable safety properties [Viswanathan 2000;Kim et al 2002]. We improve previous work by showing that there is exactly one computable safety property unenforceable by any sound security automaton: the unsatisfiable safety property that considers all executions invalid.…”
mentioning
confidence: 74%
See 1 more Smart Citation
“…Past research claimed to equate the enforcement power of truncation automata with the set of computable safety properties [Viswanathan 2000;Kim et al 2002]. We improve previous work by showing that there is exactly one computable safety property unenforceable by any sound security automaton: the unsatisfiable safety property that considers all executions invalid.…”
mentioning
confidence: 74%
“…A truncation automaton has only two options when it intercepts an action from the target program: it may accept the action and make it observable, or it may halt (i.e., truncate the action sequence of) the target program altogether. Schneider first defined this model of program monitors [Schneider 2000], and other authors have similarly focused on this simple, though limited, model when considering the properties enforceable by security automata [Viswanathan 2000;Kim et al 2002;Fong 2004]. Truncation-based monitors have been used successfully to enforce a rich set of interesting safety policies including access control [Evans and Twyman 1999], stack inspection [Erlingsson and Schneider 1999;Abadi and Fournet 2003], software fault isolation [Wahbe et al 1993;Erlingsson and Schneider 2000], Chinese Wall [Brewer and Nash 1989;Erlingsson 2003;Fong 2004], and one-out-of-k authorization [Fong 2004] policies.…”
Section: Truncation Automatamentioning
confidence: 99%
“…The computability constraints that can further restrict a monitor's enforcement power are discussed in [14,19]; that of monitors relying upon an a priori model of the program's possible behaviour is discussed in [9] and [21].…”
Section: Related Workmentioning
confidence: 99%
“…Most models (e.g., [15,17,11,9,8,1,5]) are based on truncation automata [15,12], which can only respond to policy violations by immediately halting the application being monitored (i.e., the target application). This constraint simplifies analyses but sacrifices generality.…”
Section: Related Workmentioning
confidence: 99%