Entry Ligatti:2009:RTE from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Ligatti:2009:RTE,
author = "Jay Ligatti and Lujo Bauer and David Walker",
title = "Run-Time Enforcement of Nonsafety Policies",
journal = j-TISSEC,
volume = "12",
number = "3",
pages = "19:1--19:??",
month = jan,
year = "2009",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1455526.1455532",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Feb 2 18:03:37 MST 2009",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "A common mechanism for ensuring that software behaves
securely is to monitor programs at run time and check
that they dynamically adhere to constraints specified
by a security policy. Whenever a program monitor
detects that untrusted software is attempting to
execute a dangerous action, it takes remedial steps to
ensure that only safe code actually gets
executed.\par
This article improves our understanding of the space of
policies enforceable by monitoring the run-time
behaviors of programs. We begin by building a formal
framework for analyzing policy enforcement: we
precisely define policies, monitors, and enforcement.
This framework allows us to prove that monitors enforce
an interesting set of policies that we call the
infinite renewal properties. We show how to construct a
program monitor that provably enforces any reasonable
infinite renewal property. We also show that the set of
infinite renewal properties includes some nonsafety
policies, that is, that monitors can enforce some
nonsafety (including some purely liveness) policies.
Finally, we demonstrate concrete examples of nonsafety
policies enforceable by practical run-time monitors.",
acknowledgement = ack-nhfb,
articleno = "19",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "liveness; monitoring; policy enforcement; safety;
security automata; security policies",
}
Related entries
- action,
2(2)177,
11(1)3,
11(4)21,
12(1)1,
12(2)12,
13(4)30,
14(1)10,
14(4)28,
16(1)3,
17(1)2,
17(4)13
- actually,
9(2)181,
10(3)10,
16(3)10,
17(1)1,
18(1)1
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- analyzing,
5(4)458,
7(2)274,
11(4)17,
12(2)13,
14(1)13,
16(4)17,
18(4)12
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- attempting,
12(2)11,
18(2)6
- Bauer, Lujo,
14(1)2,
18(4)13
- begin,
9(4)421
- behave,
10(4)6,
12(2)11,
18(3)9,
18(4)14
- behavior,
2(3)295,
2(4)354,
10(4)6,
11(4)19,
12(1)5,
12(3)14,
14(1)10,
14(4)32,
15(1)2,
15(2)10,
15(3)14,
16(3)12,
17(2)8,
18(2)5,
18(2)7,
18(3)9
- building,
10(1)4,
15(1)2
- call,
9(1)61,
12(1)3,
12(4)21,
13(4)35,
15(3)13,
16(2)8,
17(2)5
- check,
2(1)65,
10(2)7,
12(2)10,
16(2)5,
17(3)10,
18(2)8,
18(4)13
- code,
5(3)238,
6(2)258,
11(4)23,
12(2)10,
12(2)11,
12(3)14,
13(1)10,
13(2)17,
13(3)21,
15(1)2,
15(1)3,
15(2)10,
16(1)1,
16(2)6,
16(2)7,
16(3)9,
18(4)12
- common,
2(1)65,
9(2)181,
11(2)3,
12(1)2,
12(1)3,
13(4)30,
13(4)34,
16(4)13,
17(1)3,
18(1)1
- concrete,
12(2)10,
13(4)33,
15(1)3,
18(2)8
- constraint,
2(1)65,
3(4)207,
6(4)501,
7(3)392,
9(2)162,
10(1)2,
10(2)5,
10(2)7,
10(4)2,
11(1)3,
11(2)6,
11(3)14,
11(4)20,
12(2)8,
12(2)10,
13(1)5,
13(3)22,
13(3)25,
13(4)40,
14(4)32,
15(2)10,
15(3)13,
15(4)15,
16(1)3,
16(1)4,
16(4)17,
17(1)3,
17(2)8,
18(2)6
- construct,
9(2)181,
12(1)3,
13(4)36,
15(1)2,
17(1)2,
17(2)7
- dangerous,
12(2)10,
14(1)7,
17(3)11
- define,
1(1)26,
2(2)177,
10(1)3,
10(1)4,
10(2)8,
10(4)2,
10(4)5,
12(1)1,
13(3)24,
13(3)27,
13(4)29,
13(4)36,
14(1)9,
14(1)14,
14(3)25,
16(1)4,
17(1)2,
17(1)4
- demonstrate,
2(3)295,
10(1)4,
10(4)1,
10(4)4,
10(4)6,
11(1)3,
11(3)16,
11(4)22,
12(1)4,
13(1)10,
13(4)30,
13(4)31,
13(4)38,
14(3)27,
15(1)2,
15(1)4,
15(2)7,
15(3)12,
15(3)13,
15(4)16,
16(3)9,
16(3)10,
17(2)8,
17(3)10,
17(3)12,
17(4)16,
18(2)8,
18(4)12,
18(4)14
- detect,
2(3)295,
10(4)6,
11(3)14,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
14(1)13,
15(2)6,
16(2)5,
16(4)14,
17(4)16,
18(2)7,
18(3)9
- dynamically,
9(4)421,
11(2)5,
11(4)18,
16(2)5,
16(2)6
- enforce,
1(1)26,
2(2)177,
3(2)85,
7(3)392,
10(2)5,
12(2)8,
13(3)22,
13(3)24,
13(3)28,
14(1)6,
15(2)6,
15(2)10
- enforceable,
3(1)30,
16(1)3
- enforcement,
2(1)65,
10(2)7,
11(1)3,
12(2)8,
13(3)21,
13(3)25,
13(3)28,
14(1)6,
14(1)14,
15(2)10,
15(3)13,
16(1)3,
17(1)3
- ensure,
10(2)7,
10(3)10,
12(2)9,
12(3)14,
12(4)20,
13(3)21,
13(4)35,
14(1)13,
15(2)10,
17(2)6,
17(3)11,
18(1)2
- ensuring,
11(4)19
- example,
10(4)5,
12(1)1,
12(2)11,
12(4)20,
13(3)20,
13(4)30,
13(4)35,
13(4)39,
13(4)40,
15(2)10,
16(1)3,
16(2)5,
16(3)10,
17(1)2,
17(1)4,
18(1)1,
18(2)8,
18(4)13
- execute,
16(3)12
- finally,
2(1)3,
10(4)1,
10(4)4,
11(2)3,
11(4)17,
11(4)18,
12(3)18,
12(4)20,
14(3)27,
16(1)4,
18(2)6,
18(4)12
- formal,
2(1)65,
2(1)105,
8(4)351,
10(2)8,
10(3)10,
10(4)2,
12(1)3,
13(3)27,
14(1)9,
14(2)16,
16(4)17,
17(1)3,
18(1)4
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- get,
10(4)3,
15(2)6,
15(3)14
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- improve,
11(2)3,
11(4)17,
12(1)3,
15(1)4,
16(1)4,
16(3)10,
18(1)1,
18(2)5,
18(3)10
- include,
2(2)138,
2(2)177,
2(4)354,
11(1)3,
11(4)23,
13(3)24,
13(4)34,
15(4)16,
17(4)16,
18(1)3,
18(1)4
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(2)2,
11(3)14,
11(4)20,
11(4)22,
12(2)12,
12(3)14,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)5,
16(2)7,
16(4)17,
18(1)1,
18(1)4
- interesting,
9(4)391
- Ligatti, Jay,
13(1)4
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
10(4)6,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- monitor,
14(1)6,
15(2)10,
15(3)13,
16(1)4
- monitoring,
11(2)2,
12(2)13,
13(2)12,
13(4)38,
14(1)13,
15(2)10,
16(1)3,
16(2)7,
16(4)14
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- practical,
2(4)390,
4(2)158,
7(2)319,
9(3)325,
10(2)6,
10(4)1,
11(2)1,
11(2)5,
11(4)18,
14(1)7,
14(1)14,
14(2)20,
14(4)29,
15(1)4,
15(2)6,
15(2)7,
15(4)16,
16(3)10,
16(3)12,
16(4)13,
17(4)16,
18(1)3,
18(4)13
- precisely,
10(1)4,
11(4)21,
16(2)5,
16(2)8
- program,
2(1)65,
2(3)332,
11(3)14,
12(1)1,
12(2)10,
12(2)11,
12(3)16,
13(3)21,
14(3)24,
15(1)2,
15(2)10,
16(2)7,
17(1)2,
17(3)11,
18(1)4
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- provably,
7(2)206,
10(3)10,
11(2)4,
11(3)13,
12(3)18,
12(4)21,
13(3)21,
13(4)29,
16(4)15,
17(1)4
- prove,
10(2)8,
10(4)1,
11(2)6,
11(3)16,
11(4)18,
12(2)8,
12(3)16,
13(3)28,
15(2)9,
16(1)4,
16(2)5,
16(4)17,
17(2)5,
17(4)15,
18(2)8
- purely,
12(3)17,
15(3)12
- reasonable,
10(1)3,
16(1)4
- run,
2(2)177,
12(2)10,
12(2)11,
12(3)14,
13(1)10,
14(1)8,
14(4)31,
18(1)1
- safe,
1(1)26,
12(3)14,
15(2)10,
16(2)5
- safety,
4(2)158,
9(3)352,
9(4)391,
12(2)8,
16(1)3,
16(2)5
- securely,
10(4)3,
11(1)4
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)3,
10(4)5,
11(2)1,
11(2)3,
11(3)13,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
15(4)15,
16(1)4,
17(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)14,
18(1)4,
18(3)10,
18(3)11
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
3(1)51,
11(1)2,
12(2)11,
12(2)12,
12(3)14,
14(1)8,
14(3)24,
14(4)32,
15(2)8,
17(1)1,
17(3)11
- space,
2(3)295,
6(1)43,
6(3)327,
10(4)5,
12(2)8,
12(3)18,
14(1)14,
15(1)2,
18(4)13
- specified,
1(1)26,
9(4)421,
10(4)2,
11(1)3,
11(1)4,
11(2)4,
13(3)20,
13(3)28,
13(4)35,
17(1)2
- step,
10(1)2,
10(1)4,
12(3)18,
12(4)22,
13(1)10,
13(4)40,
14(3)26,
14(3)27,
15(4)18,
16(1)4,
16(3)10
- take,
2(4)416,
10(4)1,
12(3)17,
12(4)22,
13(3)20,
16(2)5,
16(3)9,
16(3)10,
16(4)15,
17(3)10,
18(1)4,
18(2)5,
18(4)12
- time,
2(1)105,
2(3)332,
2(4)390,
2(4)416,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(3)13,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
15(4)17,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)11,
17(4)13,
18(1)2,
18(1)4,
18(3)10
- understanding,
9(2)181,
12(1)2,
17(4)14,
18(3)9
- untrusted,
2(2)159,
2(3)269,
12(3)14,
12(3)16,
13(4)35,
13(4)37,
14(1)12,
15(2)10,
16(2)5,
16(3)12,
17(4)15,
18(3)10
- whenever,
10(4)4,
12(3)18,
13(3)22