首页 > 最新文献

Proceedings of the 20th ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies Mohawk+T:基于角色的访问控制(ATRBAC)策略的有效分析
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752966
Jonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara
Safety analysis is recognized as a fundamental problem in access control. It has been studied for various access control schemes in the literature. Recent work has proposed an administrative model for Temporal Role-Based Access Control (TRBAC) policies called Administrative TRBAC (ATRBAC). We address ATRBAC-safety. We first identify that the problem is PSPACE-Complete. This is a much tighter identification of the computational complexity of the problem than prior work, which shows only that the problem is decidable. With this result as the basis, we propose an approach that leverages an existing open-source software tool called Mohawk to address ATRBAC-safety. Our approach is to efficiently reduce ATRBAC-safety to ARBAC-safety, and then use Mohawk. We have conducted a thorough empirical assessment. In the course of our assessment, we came up with a "reduction toolkit," which allows us to reduce Mohawk+T input instances to instances that existing tools support. Our results suggest that there are some input classes for which Mohawk+T outperforms existing tools, and others for which existing tools outperform Mohawk+T. The source code for Mohawk+T is available for public download.
安全分析被认为是访问控制中的一个基本问题。文献中已经对各种访问控制方案进行了研究。最近的工作提出了一种基于临时角色的访问控制(TRBAC)策略的管理模型,称为administrative TRBAC (ATRBAC)。我们解决atrbac安全问题。我们首先确定问题是PSPACE-Complete。与之前的工作相比,这是对问题计算复杂性的更严格的识别,这只表明问题是可确定的。以这个结果为基础,我们提出了一种利用现有的开源软件工具Mohawk来解决atrbac安全问题的方法。我们的方法是有效地将atrbac安全性降低到arbac安全性,然后使用Mohawk。我们进行了彻底的实证评估。在我们的评估过程中,我们提出了一个“缩减工具包”,它允许我们将Mohawk+T输入实例缩减为现有工具支持的实例。我们的结果表明,在某些输入类上,Mohawk+T优于现有工具,而在其他输入类上,现有工具优于Mohawk+T。Mohawk+T的源代码可供公众下载。
{"title":"Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies","authors":"Jonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara","doi":"10.1145/2752952.2752966","DOIUrl":"https://doi.org/10.1145/2752952.2752966","url":null,"abstract":"Safety analysis is recognized as a fundamental problem in access control. It has been studied for various access control schemes in the literature. Recent work has proposed an administrative model for Temporal Role-Based Access Control (TRBAC) policies called Administrative TRBAC (ATRBAC). We address ATRBAC-safety. We first identify that the problem is PSPACE-Complete. This is a much tighter identification of the computational complexity of the problem than prior work, which shows only that the problem is decidable. With this result as the basis, we propose an approach that leverages an existing open-source software tool called Mohawk to address ATRBAC-safety. Our approach is to efficiently reduce ATRBAC-safety to ARBAC-safety, and then use Mohawk. We have conducted a thorough empirical assessment. In the course of our assessment, we came up with a \"reduction toolkit,\" which allows us to reduce Mohawk+T input instances to instances that existing tools support. Our results suggest that there are some input classes for which Mohawk+T outperforms existing tools, and others for which existing tools outperform Mohawk+T. The source code for Mohawk+T is available for public download.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128004562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Post-Snowden Threat Models 后斯诺登威胁模型
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752978
B. Preneel
In June 2013 Edward Snowden leaked a large collection of documents that describe the capabilities and technologies of the NSA and its allies. Even to security experts the scale, nature and impact of some of the techniques revealed was surprising. A major consequence is the increased awareness of the public at large of the existence of highly intrusive mass surveillance techniques. There has also been some impact in the business world, including a growing interest in companies that (claim to) develop end-to-end secure solutions. There is no doubt that large nation states and organized crime have carefully studied the techniques and are exploring which ones they can use for their own benefit. But after two years, there is little progress in legal or governance measures to address some of the excesses by increasing accountability. Moreover, the security research community seems to have been slow to respond to the new threat landscape. In this lecture we analyze these threats and speculate how they could be countered.
2013年6月,爱德华·斯诺登(Edward Snowden)泄露了大量文件,其中描述了美国国家安全局及其盟友的能力和技术。即使对安全专家来说,这些技术的规模、性质和影响也令人惊讶。一个主要的后果是,公众越来越意识到存在高度侵入性的大规模监视技术。在商业领域也有一些影响,包括对(声称)开发端到端安全解决方案的公司越来越感兴趣。毫无疑问,大型民族国家和有组织犯罪已经仔细研究了这些技术,并正在探索哪些技术可以为自己的利益所用。但两年过去了,在通过加强问责来解决一些过度行为的法律或治理措施方面,进展甚微。此外,安全研究界似乎对新的威胁形势反应迟缓。在这节课中,我们将分析这些威胁,并推测如何应对它们。
{"title":"Post-Snowden Threat Models","authors":"B. Preneel","doi":"10.1145/2752952.2752978","DOIUrl":"https://doi.org/10.1145/2752952.2752978","url":null,"abstract":"In June 2013 Edward Snowden leaked a large collection of documents that describe the capabilities and technologies of the NSA and its allies. Even to security experts the scale, nature and impact of some of the techniques revealed was surprising. A major consequence is the increased awareness of the public at large of the existence of highly intrusive mass surveillance techniques. There has also been some impact in the business world, including a growing interest in companies that (claim to) develop end-to-end secure solutions. There is no doubt that large nation states and organized crime have carefully studied the techniques and are exploring which ones they can use for their own benefit. But after two years, there is little progress in legal or governance measures to address some of the excesses by increasing accountability. Moreover, the security research community seems to have been slow to respond to the new threat landscape. In this lecture we analyze these threats and speculate how they could be countered.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling 通过约束驱动的虚拟资源调度降低IaaS云中的多租户风险
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752964
K. Bijon, R. Krishnan, R. Sandhu
A major concern in the adoption of cloud infrastructure-as-a-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated by a cloud service provider. A tenant could be an enterprise in the context of a public cloud or a department within an enterprise in the context of a private cloud. Enabled by virtualization technology, the service provider is able to minimize cost by providing virtualized hardware resources such as virtual machines, virtual storage and virtual networks, as a service to multiple tenants where, for instance, a tenant's virtual machine may be hosted in the same physical server as that of many other tenants. It is well-known that separation of execution environment provided by the hypervisors that enable virtualization technology has many limitations. In addition to inadvertent misconfigurations, a number of attacks have been demonstrated that allow unauthorized information flow between virtual machines hosted by a hypervisor on a given physical server. In this paper, we present attribute-based constraints specification and enforcement as a mechanism to mitigate such multi-tenancy risks that arise in cloud IaaS. We represent relevant properties of virtual resources (e.g., virtual machines, virtual networks, etc.) as their attributes. Conflicting attribute values are specified by the tenant or by the cloud IaaS system as appropriate. The goal is to schedule virtual resources on physical resources in a conflict-free manner. The general problem is shown to be NP-complete. We explore practical conflict specifications that can be efficiently enforced. We have implemented a prototype for virtual machine scheduling in OpenStack, a widely-used open-source cloud IaaS software, and evaluated its performance overhead, resource requirements to satisfy conflicts, and resource utilization.
采用云基础设施即服务(IaaS)的一个主要问题来自多租户,其中多个租户共享由云服务提供商操作的底层物理基础设施。租户可以是公共云环境中的企业,也可以是私有云环境中的企业部门。在虚拟化技术的支持下,服务提供商能够将虚拟硬件资源(如虚拟机、虚拟存储和虚拟网络)作为服务提供给多个租户,从而最大限度地降低成本,例如,一个租户的虚拟机可能与许多其他租户的虚拟机托管在同一个物理服务器上。众所周知,由支持虚拟化技术的管理程序提供的执行环境分离有许多限制。除了无意的错误配置之外,已经证明了许多攻击允许未经授权的信息在给定物理服务器上由管理程序托管的虚拟机之间流动。在本文中,我们提出了基于属性的约束、规范和实施作为一种机制,以减轻云IaaS中出现的这种多租户风险。我们将虚拟资源(如虚拟机、虚拟网络等)的相关属性表示为它们的属性。冲突的属性值由租户或云IaaS系统酌情指定。目标是以无冲突的方式在物理资源上调度虚拟资源。一般问题被证明是np完全的。我们探索可以有效执行的实际冲突规范。我们在OpenStack(一个广泛使用的开源云IaaS软件)中实现了一个虚拟机调度的原型,并评估了它的性能开销、满足冲突的资源需求和资源利用率。
{"title":"Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling","authors":"K. Bijon, R. Krishnan, R. Sandhu","doi":"10.1145/2752952.2752964","DOIUrl":"https://doi.org/10.1145/2752952.2752964","url":null,"abstract":"A major concern in the adoption of cloud infrastructure-as-a-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated by a cloud service provider. A tenant could be an enterprise in the context of a public cloud or a department within an enterprise in the context of a private cloud. Enabled by virtualization technology, the service provider is able to minimize cost by providing virtualized hardware resources such as virtual machines, virtual storage and virtual networks, as a service to multiple tenants where, for instance, a tenant's virtual machine may be hosted in the same physical server as that of many other tenants. It is well-known that separation of execution environment provided by the hypervisors that enable virtualization technology has many limitations. In addition to inadvertent misconfigurations, a number of attacks have been demonstrated that allow unauthorized information flow between virtual machines hosted by a hypervisor on a given physical server. In this paper, we present attribute-based constraints specification and enforcement as a mechanism to mitigate such multi-tenancy risks that arise in cloud IaaS. We represent relevant properties of virtual resources (e.g., virtual machines, virtual networks, etc.) as their attributes. Conflicting attribute values are specified by the tenant or by the cloud IaaS system as appropriate. The goal is to schedule virtual resources on physical resources in a conflict-free manner. The general problem is shown to be NP-complete. We explore practical conflict specifications that can be efficiently enforced. We have implemented a prototype for virtual machine scheduling in OpenStack, a widely-used open-source cloud IaaS software, and evaluated its performance overhead, resource requirements to satisfy conflicts, and resource utilization.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Privacy and Access Control: How are These Two concepts Related? 隐私和访问控制:这两个概念是如何关联的?
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752980
A. Squicciarini, Ting Yu
Privacy issues are increasingly becoming important for many domains and applications. Many of such issues arise from the constant streaming of personal and sensitive data made available from lay users online, and also from the emerging widespread of highly ubiquitous and content-rich, personalized applications. Further, strong regulatory frameworks are now in place to ensure that users’ data is properly managed and protected. For instance, the responsible management of sensitive data is explicitly being mandated through laws such as the Sarbanes-Oaxley Act and the Health Insurance Portability and Accountability Act (HIPAA). Accordingly, data and user privacy have received substantial research attention over the past years. Several technical challenges have been tackled, including how to balance utility with the need to preserve privacy of individual data, and how to protect data from unwanted and unauthorized parties [5, 1, 6, 2]. In parallel, in response to several privacy outcries, many companies and organizations involved with users’ data collection and management (particularly online) have also made an effort toward introducing stronger privacy and access control solutions. Yet these efforts have been shown to be inadequate or insufficient [7]. Among the various methods and mechanisms to ensure users’ privacy, access control techniques are a well-established building block to protect users’ data. Historically, the mechanism for access control was considered only a support provided by database systems for sensitive structured data. Such a model of authorization is intuitive to application developers and users of the database system, but it only
隐私问题在许多领域和应用中变得越来越重要。许多这样的问题来自于外行用户在线上提供的个人和敏感数据的不断流动,也来自于高度普及和内容丰富的个性化应用程序的广泛出现。此外,强有力的监管框架现已到位,以确保用户数据得到妥善管理和保护。例如,《萨班斯-奥克斯利法案》(Sarbanes-Oaxley Act)和《健康保险流通与责任法案》(HIPAA)等法律明确要求对敏感数据进行负责任的管理。因此,数据和用户隐私在过去几年受到了大量的研究关注。已经解决了几个技术挑战,包括如何平衡效用与保护个人数据隐私的需要,以及如何保护数据免受不受欢迎和未经授权的方的侵害[5,1,6,2]。与此同时,为了应对一些隐私问题,许多涉及用户数据收集和管理(特别是在线数据)的公司和组织也在努力引入更强大的隐私和访问控制解决方案。然而,这些努力已被证明是不够的。在保护用户隐私的各种方法和机制中,访问控制技术是保护用户数据的一个完善的组成部分。过去,访问控制机制被认为只是数据库系统为敏感结构化数据提供的一种支持。这种授权模型对于应用程序开发人员和数据库系统的用户来说是直观的,但它只是
{"title":"Privacy and Access Control: How are These Two concepts Related?","authors":"A. Squicciarini, Ting Yu","doi":"10.1145/2752952.2752980","DOIUrl":"https://doi.org/10.1145/2752952.2752980","url":null,"abstract":"Privacy issues are increasingly becoming important for many domains and applications. Many of such issues arise from the constant streaming of personal and sensitive data made available from lay users online, and also from the emerging widespread of highly ubiquitous and content-rich, personalized applications. Further, strong regulatory frameworks are now in place to ensure that users’ data is properly managed and protected. For instance, the responsible management of sensitive data is explicitly being mandated through laws such as the Sarbanes-Oaxley Act and the Health Insurance Portability and Accountability Act (HIPAA). Accordingly, data and user privacy have received substantial research attention over the past years. Several technical challenges have been tackled, including how to balance utility with the need to preserve privacy of individual data, and how to protect data from unwanted and unauthorized parties [5, 1, 6, 2]. In parallel, in response to several privacy outcries, many companies and organizations involved with users’ data collection and management (particularly online) have also made an effort toward introducing stronger privacy and access control solutions. Yet these efforts have been shown to be inadequate or insufficient [7]. Among the various methods and mechanisms to ensure users’ privacy, access control techniques are a well-established building block to protect users’ data. Historically, the mechanism for access control was considered only a support provided by database systems for sensitive structured data. Such a model of authorization is intuitive to application developers and users of the database system, but it only","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hard Instances for Verification Problems in Access Control 访问控制中验证问题的硬实例
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752959
Nima Mousavi, Mahesh V. Tripunitara
We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P ≠ NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based Access Control (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to access control research.
我们解决了NP-hard访问控制中验证问题的硬实例的生成和分析。给定P≠NP的习惯假设,我们知道存在这样的类。本文主要研究基于角色的访问控制中的用户授权查询问题(UAQ)。我们展示了如何系统地为它生成硬实例。然后我们分析这些困难实例的结构。我们的工作为访问控制研究带来了系统研究硬输入类的重要方面。
{"title":"Hard Instances for Verification Problems in Access Control","authors":"Nima Mousavi, Mahesh V. Tripunitara","doi":"10.1145/2752952.2752959","DOIUrl":"https://doi.org/10.1145/2752952.2752959","url":null,"abstract":"We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P ≠ NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based Access Control (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to access control research.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114326708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federated Access Management for Collaborative Network Environments: Framework and Case Study 协作网络环境的联邦访问管理:框架和案例研究
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752977
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of being involved in inter-organizational, multi-disciplinary, and collaborative projects that may require diverse resources to be shared among participants. In particular, an environment that often makes use of a group of high-performance network facilities would involve large-scale collaborative projects and tremendously seek a robust and flexible access control for allowing collaborators to leverage and consume resources, e.g., computing power and bandwidth. In this paper, we propose a federated access management scheme that leverages the notion of attributes. Our approach allows resource-sharing organizations to provide distributed provisioning (publication, location, communication, and evaluation) of both attributes and policies for federated access management purposes. Also, we provide a proof-of-concept implementation that leverages distributed hash tables (DHT) to traverse chains of attributes and effectively handle the federated access management requirements devised for inter-organizational resource sharing and collaborations.
随着各种协作共享机制(如网格、P2P和云)的出现,包括私营和公共部门在内的组织已经认识到参与可能需要在参与者之间共享不同资源的跨组织、多学科和协作项目的好处。特别是,经常使用一组高性能网络设施的环境将涉及大规模的协作项目,并且极大地寻求一种强大而灵活的访问控制,以允许合作者利用和消耗资源,例如计算能力和带宽。在本文中,我们提出了一种利用属性概念的联合访问管理方案。我们的方法允许资源共享组织为联邦访问管理目的提供属性和策略的分布式供应(发布、定位、通信和评估)。此外,我们还提供了一个概念验证实现,该实现利用分布式散列表(DHT)来遍历属性链,并有效地处理为组织间资源共享和协作而设计的联邦访问管理需求。
{"title":"Federated Access Management for Collaborative Network Environments: Framework and Case Study","authors":"Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn","doi":"10.1145/2752952.2752977","DOIUrl":"https://doi.org/10.1145/2752952.2752977","url":null,"abstract":"With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of being involved in inter-organizational, multi-disciplinary, and collaborative projects that may require diverse resources to be shared among participants. In particular, an environment that often makes use of a group of high-performance network facilities would involve large-scale collaborative projects and tremendously seek a robust and flexible access control for allowing collaborators to leverage and consume resources, e.g., computing power and bandwidth. In this paper, we propose a federated access management scheme that leverages the notion of attributes. Our approach allows resource-sharing organizations to provide distributed provisioning (publication, location, communication, and evaluation) of both attributes and policies for federated access management purposes. Also, we provide a proof-of-concept implementation that leverages distributed hash tables (DHT) to traverse chains of attributes and effectively handle the federated access management requirements devised for inter-organizational resource sharing and collaborations.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mitigating Access Control Vulnerabilities through Interactive Static Analysis 通过交互式静态分析减少访问控制漏洞
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752976
Jun Zhu, Bill Chu, H. Lipford, Tyler Thomas
Access control vulnerabilities due to programming errors have consistently ranked amongst top software vulnerabilities. Previous research efforts have concentrated on using automatic program analysis techniques to detect access control vulnerabilities in applications. We report a comparative study of six open source PHP applications, and find that implicit assumptions of previous research techniques can significantly limit their effectiveness. We propose a more effective hybrid approach to mitigate access control vulnerabilities. Developers are reminded in-situ of potential access control vulnerabilities, where self-review of code can help them discover mistakes. Additionally, developers are prompted for application-specific access control knowledge, providing samples of code that could be thought of as static analysis by example. These examples are turned into code patterns that can be used in performing static analysis to detect additional access control vulnerabilities and alert the developer to take corrective actions. Our evaluation of six open source applications detected 20 zero-day access control vulnerabilities in addition to finding all access control vulnerabilities detected in previous works.
由于编程错误而导致的访问控制漏洞一直名列软件漏洞的前列。以前的研究工作集中在使用自动程序分析技术来检测应用程序中的访问控制漏洞。我们报告了对六个开源PHP应用程序的比较研究,并发现先前研究技术的隐含假设可能会显著限制其有效性。我们提出了一种更有效的混合方法来减轻访问控制漏洞。开发人员在现场被提醒潜在的访问控制漏洞,自我审查代码可以帮助他们发现错误。此外,还提示开发人员了解特定于应用程序的访问控制知识,提供可被视为静态分析的示例代码示例。这些示例被转换成代码模式,可用于执行静态分析,以检测额外的访问控制漏洞,并提醒开发人员采取纠正措施。我们对六个开源应用程序的评估发现了20个零日访问控制漏洞,此外还发现了之前工作中检测到的所有访问控制漏洞。
{"title":"Mitigating Access Control Vulnerabilities through Interactive Static Analysis","authors":"Jun Zhu, Bill Chu, H. Lipford, Tyler Thomas","doi":"10.1145/2752952.2752976","DOIUrl":"https://doi.org/10.1145/2752952.2752976","url":null,"abstract":"Access control vulnerabilities due to programming errors have consistently ranked amongst top software vulnerabilities. Previous research efforts have concentrated on using automatic program analysis techniques to detect access control vulnerabilities in applications. We report a comparative study of six open source PHP applications, and find that implicit assumptions of previous research techniques can significantly limit their effectiveness. We propose a more effective hybrid approach to mitigate access control vulnerabilities. Developers are reminded in-situ of potential access control vulnerabilities, where self-review of code can help them discover mistakes. Additionally, developers are prompted for application-specific access control knowledge, providing samples of code that could be thought of as static analysis by example. These examples are turned into code patterns that can be used in performing static analysis to detect additional access control vulnerabilities and alert the developer to take corrective actions. Our evaluation of six open source applications detected 20 zero-day access control vulnerabilities in addition to finding all access control vulnerabilities detected in previous works.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Prototype to Reduce the Amount of Accessible Information 减少可访问信息数量的原型
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752953
Rainer Fischer
Authorized insiders downloading mass data via their user interface are still a problem. In this paper a prototype to prevent mass data extractions is proposed. Access control models efficiently protect security objects but fail to define subsets of data which are narrow enough to be harmless if downloaded. Instead of controlling access to security objects the prototype limits the amount of accessible information. A heuristic approach to measures the amount of information is used. The paper describes the implementation of the prototype which is an extension of an SAP system as an example for a large enterprise information system.
授权内部人员通过其用户界面下载大量数据仍然是个问题。本文提出了一种防止大量数据抽取的原型。访问控制模型可以有效地保护安全对象,但无法定义足够窄的数据子集,这些子集在下载时是无害的。原型没有控制对安全对象的访问,而是限制了可访问信息的数量。使用启发式方法来测量信息量。本文以某大型企业信息系统为例,介绍了SAP系统的扩展原型的实现。
{"title":"A Prototype to Reduce the Amount of Accessible Information","authors":"Rainer Fischer","doi":"10.1145/2752952.2752953","DOIUrl":"https://doi.org/10.1145/2752952.2752953","url":null,"abstract":"Authorized insiders downloading mass data via their user interface are still a problem. In this paper a prototype to prevent mass data extractions is proposed. Access control models efficiently protect security objects but fail to define subsets of data which are narrow enough to be harmless if downloaded. Instead of controlling access to security objects the prototype limits the amount of accessible information. A heuristic approach to measures the amount of information is used. The paper describes the implementation of the prototype which is an extension of an SAP system as an example for a large enterprise information system.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initial Encryption of large Searchable Data Sets using Hadoop 使用Hadoop对大型可搜索数据集进行初始加密
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752960
Feng Wang, Mathias Kohler, A. Schaad
With the introduction and the widely use of external hosted infrastructures, secure storage of sensitive data becomes more and more important. There are systems available to store and query encrypted data in a database, but not all applications may start with empty tables rather than having sets of legacy data. Hence, there is a need to transform existing plaintext databases to encrypted form. Usually existing enterprise databases may contain terabytes of data. A single machine would require many months for the initial encryption of a large data set. We propose encrypting data in parallel using a Hadoop cluster which is a simple five step process including the Hadoop set up, target preparation, source data import, encrypting the data, and finally exporting it to the target. We evaluated our solution on real world data and report on performance and data consumption. The results show that encrypting data in parallel can be done in a very scalable manner. Using a parallelized encryption cluster compared to a single server machine reduces the encryption time from months down to days or even hours.
随着外部托管基础设施的引入和广泛使用,敏感数据的安全存储变得越来越重要。有一些系统可用于在数据库中存储和查询加密数据,但并非所有应用程序都可以从空表开始,而不是从遗留数据集开始。因此,需要将现有的明文数据库转换为加密形式。通常,现有的企业数据库可能包含数tb的数据。一台机器对一个大数据集进行初始加密需要好几个月的时间。我们建议使用Hadoop集群并行加密数据,这是一个简单的五步过程,包括Hadoop设置,目标准备,源数据导入,数据加密,最后导出到目标。我们根据真实世界的数据评估了我们的解决方案,并报告了性能和数据消耗情况。结果表明,并行数据加密可以以一种非常可扩展的方式完成。与使用单个服务器机器相比,使用并行加密集群可以将加密时间从几个月减少到几天甚至几个小时。
{"title":"Initial Encryption of large Searchable Data Sets using Hadoop","authors":"Feng Wang, Mathias Kohler, A. Schaad","doi":"10.1145/2752952.2752960","DOIUrl":"https://doi.org/10.1145/2752952.2752960","url":null,"abstract":"With the introduction and the widely use of external hosted infrastructures, secure storage of sensitive data becomes more and more important. There are systems available to store and query encrypted data in a database, but not all applications may start with empty tables rather than having sets of legacy data. Hence, there is a need to transform existing plaintext databases to encrypted form. Usually existing enterprise databases may contain terabytes of data. A single machine would require many months for the initial encryption of a large data set. We propose encrypting data in parallel using a Hadoop cluster which is a simple five step process including the Hadoop set up, target preparation, source data import, encrypting the data, and finally exporting it to the target. We evaluated our solution on real world data and report on performance and data consumption. The results show that encrypting data in parallel can be done in a very scalable manner. Using a parallelized encryption cluster compared to a single server machine reduces the encryption time from months down to days or even hours.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Inference of Access Control Policies for Web Applications Web应用访问控制策略的自动推理
Pub Date : 2015-06-01 DOI: 10.1145/2752952.2752969
H. Le, Duy Cu Nguyen, L. Briand, Benjamin Hourte
In this paper, we present a novel, semi-automated approach to infer access control policies automatically for web-based applications. Our goal is to support the validation of implemented access control policies, even when they have not been clearly specified or documented. We use role-based access control as a reference model. Built on top of a suite of security tools, our approach automatically exercises a system under test and builds access spaces for a set of known users and roles. Then, we apply a machine learning technique to infer access rules. Inconsistent rules are then analysed and fed back to the process for further testing and improvement. Finally, the inferred rules can be validated based on pre-specified rules if they exist. Otherwise, the inferred rules are presented to human experts for validation and for detecting access control issues. We have evaluated our approach on two applications; one is open source while the other is a proprietary system built by our industry partner. The obtained results are very promising in terms of the quality of inferred rules and the access control vulnerabilities it helped detect.
在本文中,我们提出了一种新颖的半自动方法来自动推断基于web的应用程序的访问控制策略。我们的目标是支持已实现的访问控制策略的验证,即使它们没有明确指定或文档化。我们使用基于角色的访问控制作为参考模型。我们的方法建立在一套安全工具之上,自动地测试系统,并为一组已知的用户和角色构建访问空间。然后,我们应用机器学习技术来推断访问规则。然后分析不一致的规则并将其反馈到流程中,以进行进一步的测试和改进。最后,可以根据预先指定的规则(如果存在)验证推断出的规则。否则,推断出的规则将提交给人类专家进行验证和检测访问控制问题。我们已经在两个应用中评估了我们的方法;一个是开源的,而另一个是由我们的行业合作伙伴构建的专有系统。就推断规则的质量和它帮助检测的访问控制漏洞而言,获得的结果非常有希望。
{"title":"Automated Inference of Access Control Policies for Web Applications","authors":"H. Le, Duy Cu Nguyen, L. Briand, Benjamin Hourte","doi":"10.1145/2752952.2752969","DOIUrl":"https://doi.org/10.1145/2752952.2752969","url":null,"abstract":"In this paper, we present a novel, semi-automated approach to infer access control policies automatically for web-based applications. Our goal is to support the validation of implemented access control policies, even when they have not been clearly specified or documented. We use role-based access control as a reference model. Built on top of a suite of security tools, our approach automatically exercises a system under test and builds access spaces for a set of known users and roles. Then, we apply a machine learning technique to infer access rules. Inconsistent rules are then analysed and fed back to the process for further testing and improvement. Finally, the inferred rules can be validated based on pre-specified rules if they exist. Otherwise, the inferred rules are presented to human experts for validation and for detecting access control issues. We have evaluated our approach on two applications; one is open source while the other is a proprietary system built by our industry partner. The obtained results are very promising in terms of the quality of inferred rules and the access control vulnerabilities it helped detect.","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1