Secure Programming via Visibly Pushdown Safety Games

dc.contributor.authorHarris, William
dc.contributor.authorJha, Somesh
dc.contributor.authorReps, Thomas
dc.date.accessioned2012-04-05T14:57:24Z
dc.date.available2012-04-05T14:57:24Z
dc.date.issued2012-01
dc.description.abstractSeveral recent operating systems provide system calls that allow an application to explicitly manage the privileges of modules with which the application interacts. Such privilege-aware operating systems allow a programmer to a write a program that satisfies a strong security policy, even when it interacts with untrusted modules. However, it is often non-trivial to rewrite a program to correctly use the system calls to satisfy a high-level security policy. This paper concerns the policy-weaving problem, which is to take as input a program, a desired high-level policy for the program, and a description of how system calls affect privilege, and automatically rewrite the program to invoke the system calls so that it satisfies the policy. We present an algorithm that solves the policy-weaving problem by reducing it to finding a winning modular strategy to a visibly pushdown safety game, and applies a novel game-solving algorithm to the resulting game. Our experiments demonstrate that our algorithm can efficiently rewrite practical programs for a practical privilege-aware system.en
dc.identifier.citationTR1710en
dc.identifier.urihttp://digital.library.wisc.edu/1793/60989
dc.subjectpolicy weavingen
dc.subjectcapability-based operating systemsen
dc.subjectsafety gameen
dc.titleSecure Programming via Visibly Pushdown Safety Gamesen
dc.typeTechnical Reporten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
tr1710.pdf
Size:
492.08 KB
Format:
Adobe Portable Document Format
Description:
Main Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.03 KB
Format:
Item-specific license agreed upon to submission
Description: