2006 IEEE Symposium on Security and Privacy (S&P'06) 2006
DOI: 10.1109/sp.2006.34
|View full text |Cite
|
Sign up to set email alerts
|

Retrofitting legacy code for authorization policy enforcement

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 26 publications
0
23
0
Order By: Relevance
“…At present, there is no principled approach to determine which are securitysensitive, so the prior methods proposed to assist in authorization hook placement [42,7,11,12,13,34,30,26,33] expect programmers to specify the data types whose variables require authorization, which requires extensive domain knowledge. The identification of these data structures is not a trivial task and often takes multiple iterations to get right.…”
Section: Problem Definitionmentioning
confidence: 99%
See 3 more Smart Citations
“…At present, there is no principled approach to determine which are securitysensitive, so the prior methods proposed to assist in authorization hook placement [42,7,11,12,13,34,30,26,33] expect programmers to specify the data types whose variables require authorization, which requires extensive domain knowledge. The identification of these data structures is not a trivial task and often takes multiple iterations to get right.…”
Section: Problem Definitionmentioning
confidence: 99%
“…This definition means that solutions depend heavily on this imprecise notion of security-sensitive operation. Ganapathy et al explored techniques to group statement-level operations into sets that represent securitysensitive operations using dynamic analysis and concept analysis from manually highlighted interfaces [12,13]. This definition also means that solutions will generally be finer-grained than manual placements, since manual placements aggregate hooks based on known or anticipated patterns in permission assignments.…”
Section: Problem Definitionmentioning
confidence: 99%
See 2 more Smart Citations
“…We could circumvent this limitation by writing our own LoPSiL enforcement-code inliner (e.g., using tools like the Bytecode Engineering Library [26]), as previous work has done [9,11]. Moreover, to save users from the effort of creating an .srm file, we could automatically extract a set of security-relevant methods by performing static analysis on policy code [27,28,29]. For the sake of simplicity, we did not include such features in our proof-of-concept compiler.…”
Section: Because Lopsil Uses Aspectj As Its Application Rewriter Lopmentioning
confidence: 99%