2020
DOI: 10.1007/978-3-030-53288-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Stratified Abstraction of Access Control Policies

Abstract: The shift to cloud-based APIs has made application security critically depend on understanding and reasoning about policies that regulate access to cloud resources. We present stratified predicate abstraction, a new approach that summarizes complex security policies into a compact set of positive and declarative statements that precisely state who has access to a resource. We have implemented stratified abstraction and deployed it as the engine powering AWS's IAM Access Analyzer service, and hence, demonstrate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In recent years, researchers have proposed various approaches to tackle this challenge with dedicated solvers for string constraints [3,5,11,19,21], often as extensions of satisfiability modulo theories (SMT) solvers [10]. Dedicated solvers have been successfully used in a wide range of applications, including: finding or proving the absence of SQL injections and XSS vulnerabilities in web applications [30,32,35]; reasoning about access policies in cloud infrastructure [6,7,13]; and generating database tables from SQL queries for unit testing [34].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, researchers have proposed various approaches to tackle this challenge with dedicated solvers for string constraints [3,5,11,19,21], often as extensions of satisfiability modulo theories (SMT) solvers [10]. Dedicated solvers have been successfully used in a wide range of applications, including: finding or proving the absence of SQL injections and XSS vulnerabilities in web applications [30,32,35]; reasoning about access policies in cloud infrastructure [6,7,13]; and generating database tables from SQL queries for unit testing [34].…”
Section: Introductionmentioning
confidence: 99%
“…The use of automated reasoning techniques to analyze properties of cloud infrastructure is gaining increasing attention [6,4,7,5,17]. Despite that, more effort needs to be put into the modeling and verification of generic security requirements over cloud infrastructure pre-deployment.…”
Section: Introductionmentioning
confidence: 99%
“…Satisfiability Modulo Theories (SMT) solvers determine the satisfiability of formulas over first-order theories and their combinations. They serve as back-end reasoning engines for a wide range of applications in academia and industry [18,27], including hardware and software verification [14,29,31,35,38,40], model checking [23,24,46], security [12,33], automated test-case generation [22,50], and synthesis [10,34]. Notable SMT solvers include Bitwuzla [42], Boolector [46], cvc5 [13], MathSAT [26], OpenSMT2 [36], SMTInterpol [25], SMT-RAT [28], STP [32], veriT [20], Yices2 [30], and Z3 [41].…”
Section: Introductionmentioning
confidence: 99%