2016
DOI: 10.1007/978-3-319-30303-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Enforcement with Partial Control

Abstract: This study carries forward the line of enquiry that seeks to characterize precisely which security policies are enforceable by runtime monitors. In this regard, Basin et al. recently refined the structure that helps distinguish between those actions that the monitor can potentially suppress or insert in the execution, from those that the monitor can only observe. In this paper, we generalize this model by organizing the universe of possible actions in a lattice that naturally corresponds to the levels of monit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Ligatti et al [2] consider more varied models of monitors, capable of inserting events in the execution stream, of suppressing the occurrence of some events while allowing the remainder of the execution to proceed, or both. Another characterization, in which some events lie beyond the control of the monitor, was proposed by Khoury et al [20].…”
Section: Monitor Capabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Ligatti et al [2] consider more varied models of monitors, capable of inserting events in the execution stream, of suppressing the occurrence of some events while allowing the remainder of the execution to proceed, or both. Another characterization, in which some events lie beyond the control of the monitor, was proposed by Khoury et al [20].…”
Section: Monitor Capabilitiesmentioning
confidence: 99%
“…Many formal models of enforcement have been proposed in the past to capture the behavior of monitors [2,19,20,23,25]. In most of them, a single mathematical structure (usually an automaton or some other type of finite state machine) is tasked with the entirety of the enforcement process: reading the input, transforming it through a process of substitutions, insertions, deletions and/or truncations, and ensuring compliance of the resulting output trace with respect to both soundness and transparency.…”
Section: Introductionmentioning
confidence: 99%
“…Models supporting uncontrollable events. Closer to controllers in supervisory-control theory (see Remark 1), enforcement mechanisms accounting for uncontrollable actions (i.e., actions that cannot be affected by the enforcement mechanism) have been defined [85,57]. In addition to the current satisfaction of the output execution, such models take into account the possible reception of uncontrollable events.…”
Section: Models Of Enforcement Mechanisms/monitorsmentioning
confidence: 99%
“…Uncontrollable actions as clock ticks were first introduced by Basin et al in [5]. Unrestricted uncontrollable actions were later introduced in extensions of GEMs in [85,84,86] and of EAs in [57].…”
Section: Models Of Enforcement Mechanisms/monitorsmentioning
confidence: 99%
“…Runtime verification aims at verifying whether an execution trace satisfies a given correctness property. Runtime enforcement [13,20,21,24] goes beyond classic runtime verification by correcting the execution that deviates from its expected behaviour to ensure the satisfaction of a given property. To do so, a so-called enforcement monitor (or enforcer in short) accepts as input a sequence of actions and generates as output a sequence of actions respecting the property.…”
Section: Introductionmentioning
confidence: 99%