作者
Jay Ligatti, Lujo Bauer, David Walker
发表日期
2009/1/1
期刊
ACM Transactions on Information and System Security (TISSEC)
卷号
12
期号
3
页码范围
1-41
出版商
ACM
简介
A common mechanism for ensuring that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is attempting to execute a dangerous action, it takes remedial steps to ensure that only safe code actually gets executed.
This article improves our understanding of the space of policies enforceable by monitoring the run-time behaviors of programs. We begin by building a formal framework for analyzing policy enforcement: we precisely define policies, monitors, and enforcement. This framework allows us to prove that monitors enforce an interesting set of policies that we call the infinite renewal properties. We show how to construct a program monitor that provably enforces any reasonable infinite renewal property. We also show that the set of infinite renewal properties …
引用总数
200820092010201120122013201420152016201720182019202020212022202320242151627232414151425121710129108
学术搜索中的文章
J Ligatti, L Bauer, D Walker - ACM Transactions on Information and System Security …, 2009