Automated detection of least privilege violations in software architectures

  • Authors:
  • Riccardo Scandariato;Koen Buyens;Wouter Joosen

  • Affiliations:
  • IBBT-DistriNet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-DistriNet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-DistriNet, Katholieke Universiteit Leuven, Leuven, Belgium

  • Venue:
  • ECSA'10 Proceedings of the 4th European conference on Software architecture
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Due to the lack of both precise definitions and effective software engineering methodologies, security principles are often neglected by software architects, resulting in potentially high-risk threats to the systems. This work lays the formal foundations for the understanding of the least privilege (LP) principle in software architectures and provides a technique to identify LP violations. The proposed approach is supported by tools and has been validated in four case studies, one of which is presented in detail in this paper.