Modelling Access Propagation in Dynamic Systems

Author:

Leonard Thomas1,Hall-May Martin1,Surridge Mike1

Affiliation:

1. IT Innovation Centre, University of Southampton

Abstract

Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often difficult to determine, especially where some components are not under our control, where components are created dynamically, or where access policies are updated dynamically. The SERSCIS Access Modeller (SAM) takes a model of a system and explores how access can propagate through it. It can both prove defined safety properties and discover unwanted properties. By defining expected behaviours, recording the results as a baseline, and then introducing untrusted actors, SAM can discover a wide variety of design flaws. SAM is designed to handle dynamic systems (i.e., at runtime, new objects are created and access policies modified) and systems where some objects are not trusted. It extends previous approaches such as Scollar and Authodox to provide a programmer-friendly syntax for specifying behaviour, and allows modelling of services with mutually suspicious clients. Taking the Confused Deputy example from Authodox we show that SAM detects the attack automatically; using a web-based backup service, we show how to model RBAC systems, detecting a missing validation check; and using a proxy certificate system, we show how to extend it to model new access mechanisms. On discovering that a library fails to follow an RFC precisely, we re-evaluate our existing models under the new assumption and discover that the proxy certificate design is not safe with this library.

Funder

Seventh Framework Programme

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference30 articles.

1. Anderson J. P. 1972. Computer security technology planning study. Tech. rep. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA. Anderson J. P. 1972. Computer security technology planning study. Tech. rep. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA.

2. Design and Semantics of a Decentralized Authorization Language

3. Strictly declarative specification of sophisticated points-to analyses

4. What you always wanted to know about Datalog (and never dared to ask)

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Towards a Model of User-centered Privacy Preservation;Proceedings of the 12th International Conference on Availability, Reliability and Security;2017-08-29

2. Building Secure Applications Using Pattern-Based Design Fragments;2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW);2015-09

3. Composing Patterns to Construct Secure Systems;2015 11th European Dependable Computing Conference (EDCC);2015-09

4. Securing a Deployment Pipeline;2015 IEEE/ACM 3rd International Workshop on Release Engineering;2015-05

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3