کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
433362 1441674 2014 15 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Hippocratic binary instrumentation: First do no harm
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Hippocratic binary instrumentation: First do no harm
چکیده انگلیسی


• We prove that monitor in-lining can secure software without impairing quality.
• Formal, automated verification proves that safe software features are preserved.
• The work improves confidence that security in-lining is adoptable in practice.

In-lined Reference Monitors (IRMs) cure binary software of security violations by instrumenting them with runtime security checks. Although over a decade of research has firmly established the power and versatility of the in-lining approach to security, its widespread adoption by industry remains impeded by concerns that in-lining may corrupt or otherwise harm intended, safe behaviors of the software it protects. Practitioners with such concerns are unwilling to adopt the technology despite its security benefits for fear that some software may break in ways that are hard to diagnose.This paper shows how recent approaches for machine-verifying the policy-compliance (soundness) of IRMs can be extended to also formally verify IRM preservation of policy-compliant behaviors (transparency). Feasibility of the approach is demonstrated through a transparency-checker implementation for Adobe ActionScript bytecode. The framework is applied to enforce security policies for Adobe Flash web advertisements and automatically verify that their policy-compliant behaviors are preserved.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Science of Computer Programming - Volume 93, Part B, 1 November 2014, Pages 110–124
نویسندگان
, , ,