Corrective enforcement of security policies

  • Authors:
  • Raphael Khoury;Nadia Tawbi

  • Affiliations:
  • Laval University, Department of Computer Science and Software Engineering;Laval University, Department of Computer Science and Software Engineering

  • Venue:
  • FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Monitoring is a powerful security policy enforcement paradigm that allows the execution of a potentially malicious software by observing and transforming it, thus ensuring its compliance with a user-defined security policy. Yet some restrictions must be imposed on the monitor's ability to transform sequences for the enforcement to be meaningful. The intuition behind our model is that the monitor should be bounded to output a sequence that both respects the desired security property and preserves key elements of the execution's semantics. An approximation of the sequence is executed rather than an equivalent one. This approximation must preserve the essential behavior of the sequence as intended by the user. In this paper, we propose a framework to express and study such a restriction based on partial orders. We give several examples of real-life security policies and propose monitors capable of enforcing these properties. We then turn to the question of comparing several monitors enforcing the same security property.