Rule-Based Monitors and Policy Invariants for Guaranteeing Mobile Code Security

dc.contributor.authorSanna Mäkelä
dc.contributor.authorSami Mäkelä
dc.contributor.authorVille Leppänen
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organizationfi=tietojenkäsittelytiede|en=Computer Science|
dc.contributor.organization-code1.2.246.10.2458963.20.71310837563
dc.contributor.organization-code2606803
dc.converis.publication-id3284528
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/3284528
dc.date.accessioned2022-10-28T12:21:16Z
dc.date.available2022-10-28T12:21:16Z
dc.description.abstract<p style="margin-left: 19.85pt;"> We consider ensuring the security of executed mobile code by applying runtime monitoring. Of the many approaches for code security, the runtime monitoring approach is perhaps the most general and flexible. We have formerly implemented a rule-based language for describing runtime security policies, and now we discuss the verification of those policies.</p> <p style="margin-left: 19.85pt;"> A security policy can be considered as a specification that restricts the execution of a program in some way. These restrictions can be connected to the program state and the execution history. In this paper, we introduce invariant expressions for our security monitor descriptions, and describe a methodology for proving that the monitor preserves its invariant. Our invariant expressions describe the true meaning of security monitor and relate the monitor state to the execution history and current state of the monitored program. The advantage of our approach is that we can prove <em>specific </em>monitors to guarantee <em>all </em>monitored programs to preserve such properties that cannot in general be effectively proved or disproved of all possible executions of any program.</p> <p style="margin-left: 19.85pt;"> &nbsp;</p>
dc.format.pagerange17
dc.format.pagerange36
dc.identifier.jour-issn1313-8251
dc.identifier.olddbid176054
dc.identifier.oldhandle10024/159148
dc.identifier.urihttps://www.utupub.fi/handle/11111/30701
dc.identifier.urnURN:NBN:fi-fe2021042715142
dc.language.isoen
dc.okm.affiliatedauthorMäkelä, Sanna
dc.okm.affiliatedauthorMäkelä, Sami
dc.okm.affiliatedauthorLeppänen, Ville
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisher.countryBulgariaen_GB
dc.publisher.countryBulgariafi_FI
dc.publisher.country-codeBG
dc.relation.ispartofjournalInternational Journal on Information Technologies and Security
dc.relation.issue2
dc.relation.volume7
dc.source.identifierhttps://www.utupub.fi/handle/10024/159148
dc.titleRule-Based Monitors and Policy Invariants for Guaranteeing Mobile Code Security
dc.year.issued2015

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
2015_N2-02.pdf
Size:
626.49 KB
Format:
Adobe Portable Document Format
Description:
Sanna Mäkelä, Sami Mäkelä, Ville Leppänen, "Rule-Based Monitors and Policy Invariants for Guaranteeing Mobile Code Security", International Journal of Information Technologies and Security (IJITS), No 2 (vol. 7), 2015, pp. 17-36.