A modular pipeline for enforcement of security properties at runtime

R Taleb, S Hallé, R Khoury - Annals of Telecommunications, 2023 - Springer
Runtime enforcement ensures the respect of a user-specified security policy by a program
by providing a valid replacement for any misbehaving sequence of events that may occur …

A modular runtime enforcement model using multi-traces

R Taleb, S Hallé, R Khoury - … Symposium on Foundations and Practice of …, 2021 - Springer
Runtime enforcement seeks to provide a valid replacement to any misbehaving sequence of
events of a running system so that the correct sequence complies with a user-defined …

Using equivalence relations for corrective enforcement of security policies

R Khoury, N Tawbi - … Network Security: 5th International Conference on …, 2010 - Springer
In this paper, we present a new framework of runtime security policy enforcement. Building
on previous studies, we examine the enforcement power of monitors able to transform their …

Equivalence-preserving corrective enforcement of security properties

R Khoury, N Tawbi - International Journal of Information …, 2015 - inderscienceonline.com
Runtime monitoring is a widely used approach for the enforcement of security policies. It
allows the safe execution of untrusted code by observing the execution and reacting if …

How powerful are run-time monitors with static information?

F Imanimehr, MS Fallah - The Computer Journal, 2016 - ieeexplore.ieee.org
Characterizing the security policies enforceable by run-time monitors has received great
attention in recent years. The research, however, has been limited to the monitors having no …

Corrective enforcement: A new paradigm of security policy enforcement by monitors

R Khoury, N Tawbi - ACM Transactions on Information and System …, 2012 - dl.acm.org
Runtime monitoring is an increasingly popular method to ensure the safe execution of
untrusted codes. Monitors observe and transform the execution of these codes, responding …

[PDF][PDF] PSI: Precise Security Instrumentation for Enterprise Networks.

T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan - NDSS, 2017 - courses.cs.duke.edu
Despite soaring investments in IT infrastructure, the state of operational network security
continues to be abysmal. We argue that this is because existing enterprise security …

Towards practical enforcement theories

N Bielova, F Massacci, A Micheletti - Identity and Privacy in the Internet …, 2009 - Springer
Runtime enforcement is a common mechanism for ensuring that program executions adhere
to constraints specified by a security policy. It is based on two simple ideas: the enforcement …

FASE: functionality-aware security enforcement

P Tsankov, M Pistoia, O Tripp, M Vechev… - Proceedings of the 32nd …, 2016 - dl.acm.org
Dynamic information-flow enforcement systems automatically protect applications against
confidentiality and integrity threats. Unfortunately, existing solutions cause undesirable side …

[引用][C] On next generation network security

N Cato - IEEE Network, 2017 - ieeexplore.ieee.org
On Next Generation Network Security Page 1 IEEE Network • March/April 2017 2 In several of
my earlier Editor’s Notes, I mentioned security to be a key aspect of various network-related …