Affiliation:
1. IT Innovation Centre, University of Southampton
Abstract
Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often difficult to determine, especially where some components are not under our control, where components are created dynamically, or where access policies are updated dynamically.
The SERSCIS Access Modeller (SAM) takes a model of a system and explores how access can propagate through it. It can both prove defined safety properties and discover unwanted properties. By defining expected behaviours, recording the results as a baseline, and then introducing untrusted actors, SAM can discover a wide variety of design flaws.
SAM is designed to handle dynamic systems (i.e., at runtime, new objects are created and access policies modified) and systems where some objects are not trusted. It extends previous approaches such as Scollar and Authodox to provide a programmer-friendly syntax for specifying behaviour, and allows modelling of services with mutually suspicious clients.
Taking the Confused Deputy example from Authodox we show that SAM detects the attack automatically; using a web-based backup service, we show how to model RBAC systems, detecting a missing validation check; and using a proxy certificate system, we show how to extend it to model new access mechanisms. On discovering that a library fails to follow an RFC precisely, we re-evaluate our existing models under the new assumption and discover that the proxy certificate design is not safe with this library.
Funder
Seventh Framework Programme
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference30 articles.
1. Anderson J. P. 1972. Computer security technology planning study. Tech. rep. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA. Anderson J. P. 1972. Computer security technology planning study. Tech. rep. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA.
2. Design and Semantics of a Decentralized Authorization Language
3. Strictly declarative specification of sophisticated points-to analyses
4. What you always wanted to know about Datalog (and never dared to ask)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards a Model of User-centered Privacy Preservation;Proceedings of the 12th International Conference on Availability, Reliability and Security;2017-08-29
2. Building Secure Applications Using Pattern-Based Design Fragments;2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW);2015-09
3. Composing Patterns to Construct Secure Systems;2015 11th European Dependable Computing Conference (EDCC);2015-09
4. Securing a Deployment Pipeline;2015 IEEE/ACM 3rd International Workshop on Release Engineering;2015-05