首页> 外文学位 >Retrofitting legacy code for authorization policy enforcement
【24h】

Retrofitting legacy code for authorization policy enforcement

机译:改造旧代码以执行授权策略

获取原文
获取原文并翻译 | 示例

摘要

Research in computer security has historically advocated Design for Security, the principle that security must be proactively integrated into the design of a system. While examples exist in the research literature of systems that have been designed for security, there are few examples of such systems deployed in the real world. Economic and practical considerations force developers to abandon security and focus instead on functionality and performance, which are more tangible than security. As a result, large bodies of legacy code often have inadequate security mechanisms. Security mechanisms are added to legacy code on-demand using ad hoc and manual techniques, and the resulting systems are often insecure.;This dissertation advocates the need for techniques to retrofit systems with security mechanisms. In particular, it focuses on the problem of retrofitting legacy code with mechanisms for authorization policy enforcement. It introduces a new formalism, called fingerprints, to represent security-sensitive operations. Fingerprints are code templates that represent accesses to security-critical resources, and denote key steps needed to perform operations on these resources. This dissertation develops both fingerprint mining and fingerprint matching algorithms.;Fingerprint mining algorithms discover fingerprints of security-sensitive operations by analyzing source code. This dissertation presents two novel algorithms that use dynamic program analysis and static program analysis, respectively, to mine fingerprints. The fingerprints so mined are used by the fingerprint matching algorithm to statically locate security-sensitive operations. Program transformation is then employed to statically modify source code by adding authorization policy lookups at each location that performs a security-sensitive operation.;The techniques developed in this dissertation have been applied to three real-world systems. These case studies demonstrate that techniques based upon program analysis and transformation offer a principled and automated alternative to the ad hoc and manual techniques that are currently used to retrofit legacy software with security mechanisms.
机译:过去,计算机安全研究一直倡导“安全设计”这一设计原则,即必须将安全性主动集成到系统设计中。虽然在研究文献中存在针对安全性而设计的系统的示例,但在现实世界中部署的此类系统的示例很少。从经济和实践考虑,开发人员不得不放弃安全性,而将精力集中在功能性和性能上,而功能性和性能要比安全性更为切实。结果,大量的遗留代码通常没有足够的安全性机制。安全机制是使用临时和手动技术按需添加到遗留代码中的,因此生成的系统通常是不安全的。;本论文提倡对使用安全机制对系统进行改造的技术的需求。特别是,它着重于使用授权策略实施机制来改造旧代码的问题。它引入了一种新的形式主义,称为指纹,以表示对安全敏感的操作。指纹是代码模板,代表对安全性至关重要的资源的访问,并表示对这些资源执行操作所需的关键步骤。本文研究了指纹挖掘和指纹匹配算法。指纹挖掘算法通过对源代码的分析来发现安全敏感操作的指纹。本文提出了两种新颖的算法,分别使用动态程序分析和静态程序分析来挖掘指纹。指纹匹配算法使用这样提取的指纹来静态定位对安全敏感的操作。然后,通过在每个执行安全敏感操作的位置添加授权策略查找,通过程序转换来静态修改源代码。本文所开发的技术已应用于三个实际系统。这些案例研究表明,基于程序分析和转换的技术提供了一种原则性和自动化的替代方法,可以替代目前用于通过安全机制改造旧版软件的即席和手动技术。

著录项

  • 作者

    Ganapathy, Vinod.;

  • 作者单位

    The University of Wisconsin - Madison.;

  • 授予单位 The University of Wisconsin - Madison.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 115 p.
  • 总页数 115
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号