作者
Jay Ligatti, Lujo Bauer, David Walker
发表日期
2005/2
期刊
International Journal of Information Security
卷号
4
页码范围
2-16
出版商
Springer Berlin Heidelberg
简介
We analyze the space of security policies that can be enforced by monitoring and modifying programs at run time. Our program monitors, called edit automata, are abstract machines that examine the sequence of application program actions and transform the sequence when it deviates from a specified policy. Edit automata have a rich set of transformational powers: they may terminate an application, thereby truncating the program action stream; they may suppress undesired or dangerous actions without necessarily terminating the program; and they may also insert additional actions into the event stream.
After providing a formal definition of edit automata, we develop a rigorous framework for reasoning about them and their cousins: truncation automata (which can only terminate applications), suppression automata (which can terminate applications and suppress individual actions), and insertion …
引用总数
20042005200620072008200920102011201220132014201520162017201820192020202120222023202491523283337273435282223262215151415776
学术搜索中的文章
J Ligatti, L Bauer, D Walker - International Journal of Information Security, 2005