Proceedings of the 9th International Conference on Aspect-Oriented Software Development 2010
DOI: 10.1145/1739230.1739253
|View full text |Cite
|
Sign up to set email alerts
|

Disambiguating aspect-oriented security policies

Abstract: Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies often manifest as ambiguities in which aspects provide conflicting advice for a shared join point. The design and implementation of a detection algorithm for such ambiguities is presented and evaluated. The algorithm reduces advice conflict detection to a combination of boolean satisfiability, linear programming, and regular language non… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 35 publications
(45 reference statements)
0
10
0
Order By: Relevance
“…Rewriters then synthesize their own advice in order to enforce the prescribed policy. The use of declarative state-transitions instead of imperative advice facilitates formal, automated reasoning about policies without the need to reason about arbitrary code [21].…”
Section: Policy Language and Rewritermentioning
confidence: 99%
See 1 more Smart Citation
“…Rewriters then synthesize their own advice in order to enforce the prescribed policy. The use of declarative state-transitions instead of imperative advice facilitates formal, automated reasoning about policies without the need to reason about arbitrary code [21].…”
Section: Policy Language and Rewritermentioning
confidence: 99%
“…Verifiers for these systems can prove that the IRM system has correctly in-lined the policy-prescribed advice code but not that this advice actually enforces the desired policy. Past case studies have demonstrated that such advice is extremely difficult to write correctly, especially when the policy is intended to apply to large classes of untrusted programs rather than individual applications [21]. Moreover, in many domains, such as web ad security, policy specifications change rapidly as new attacks and vulnerabilities are discovered (cf., [23,29,30]).…”
Section: Introductionmentioning
confidence: 99%
“…Formal Policy Analysis: UTD PI Hamlen is an expert in the emerging field of language-based security, which leverages techniques from programming language theory and compilers to enforce software security and policy analysis. By reducing highlevel security policy specifications and system models to the level of the denotational and operational semantics of their binary-level implementations, our past work has developed formally machine-certifiable security enforcement mechanisms of a variety of complex software systems, including those implemented in .NET [16], ActionScript [19], Java [13], and native code [31]. Working at the binary level provides extremely high formal guarantees because it permits the tool chain that produces mission-critical software components to remain untrusted; the binary code produced by the chain can be certified directly.…”
Section: Pre-processingmentioning
confidence: 99%
“…Therefore, it becomes imperative to provide guarantees that the policies are enforced in a provably correct manner. We have extensive expertise in formal policy analysis [13][14] and their enforcement via machine-certified, in-line reference monitors [15][16][17]. Such analyses will be leveraged to model and certify security properties enforced by core software components in the trusted computing base of CAISS++.…”
Section: Introductionmentioning
confidence: 99%
“…• SPoX facilitated formal policy analyses, such as policy inconsistency detection and elimination, that are provably undecidable with traditional, non-declarative aspect-oriented specification approaches [12].…”
Section: Executive Summary Of Conclusionmentioning
confidence: 99%