首页> 外文会议>IEEE International Working Conference on Source Code Analysis and Manipulation >Static Extraction of Enforced Authorization Policies SeeAuthz
【24h】

Static Extraction of Enforced Authorization Policies SeeAuthz

机译:强制授权策略的静态提取SeeAuthz

获取原文

摘要

Authorization is an intrinsic part of a software’s security. Determining whether a user is allowed to access a resource or not is crucial, not only in safety-critical applications but also in everyday applications to prevent misuse of data or software. There is plenty of research dealing with validating and verifying authorization policies in the security community. Still, an implemented authorization policy does not necessarily match the planned authorization policy, i.e., even a validated and verified authorization policy can pose security issues when implemented incorrectly. This gap between planned and implemented authorization policy poses the risk of unauthorized access to sensitive resources due to insufficient authorization checks. Therefore, it is essential to ensure a system’s security to validate the implemented authorization policy against the planned one. We, therefore, describe the authorization pattern and present an algorithm to extract authorization graphs from implemented authorization policies, which can then be used to compare against the planned authorization policy. To that end, we developed a configurable context-sensitive analysis tailored to Java-based software systems, where the context is the authorization facts that hold on each point. Using a configuration for Apache Shiro, a security library that supports authorization, we evaluated our implementation using an open-source repository system for the management and dissemination of digital content and a closed-source manufacturing execution system. We discuss additional usage scenarios of the analysis results and describe how to transfer the approach to other authorization policies and programming languages.
机译:授权是软件安全性的内在组成部分。确定用户是否被允许访问资源至关重要,这不仅在安全性至关重要的应用程序中,而且在日常应用程序中也是如此,以防止滥用数据或软件。在安全社区中,有大量有关验证和验证授权策略的研究。仍然,已实施的授权策略不一定与计划的授权策略相匹配,即,即使验证和验证的授权策略在实施不正确时也会造成安全性问题。由于授权检查不充分,计划的和实施的授权策略之间的这种差距带来了未经授权访问敏感资源的风险。因此,至关重要的是要确保系统的安全性,以根据计划的策略验证已实施的授权策略。因此,我们描述了授权模式,并提出了一种算法,可从已实施的授权策略中提取授权图,然后将其用于与计划的授权策略进行比较。为此,我们针对基于Java的软件系统开发了可配置的上下文相关分析,其中上下文是保留在每个点上的授权事实。通过使用支持授权的安全性库Apache Shiro的配置,我们使用用于管理和分发数字内容的开源存储库系统以及一个封闭源代码的制造执行系统,评估了我们的实施情况。我们讨论了分析结果的其他使用场景,并描述了如何将方法转移到其他授权策略和编程语言。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号