跳到主要导航 跳到搜索 跳到主要内容

Generating permission-based security policies

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

For access control in Java or.NET web applications, methods on the runtime stack are examined by the runtime systems for granted permissions, to prohibit from executing untrusted codes. There are quite limited research work on automatically generating security policies for configuring application components. In practice, configuring a security policy of web applications almost relies on the expertise of developers. In this work, we present an approach to automatically generating permission-based security policies for Java applications to pass the runtime authorization. Our technique is based on context-sensitive static proram analysis in the framework of conditional weighted pushdown systems. To tackle with the challenges of access rights analysis such as to statically identify permissions to be examined at stack inspection points, we propose to apply a uniform abstract interpretation of program calling contexts which are used to glue various analysis modules involved in access rights analysis including points-to analysis, string analysis and policy generation analysis. As a result, we can statically identify relevant permissions at the stack inspection sites and perform context-sensitive policy generation analysis.

源语言英语
主期刊名Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
出版商Institute of Electrical and Electronics Engineers Inc.
1-7
页数7
ISBN(电子版)9781538692660
DOI
出版状态已出版 - 5 12月 2018
活动5th International Conference on Dependable Systems and Their Applications, DSA 2018 - Dalian, 中国
期限: 22 9月 201823 9月 2018

出版系列

姓名Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

会议

会议5th International Conference on Dependable Systems and Their Applications, DSA 2018
国家/地区中国
Dalian
时期22/09/1823/09/18

指纹

探究 'Generating permission-based security policies' 的科研主题。它们共同构成独一无二的指纹。

引用此