Security-policy monitoring and enforcement with JavaMOP

Soha Hussein, Patrick Meredith, Grigore Roşlu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

Software security attacks represent an ever growing problem. One way to make software more secure is to use Inlined Reference Monitors (IRMs), which allow security specifications to be inlined inside a target program to ensure its compliance with the desired security specifications. The IRM approach has been developed primarily by the security community. Runtime Verification (RV), on the other hand, is a software engineering approach, which is intended to formally encode system specifications within a target program such that those specifications can be later enforced during the execution of the program. Until now, the IRM and RV approaches have lived separate lives; in particular RV techniques have not been applied to the security domain, being used instead to aid program correctness and testing. This paper discusses the usage of a formalism-generic RV system, JavaMOP, as a means to specify IRMs, leveraging the careful engineering of the JavaMOP system for ensuring secure operation of software in an efficient manner.

Original languageEnglish (US)
Title of host publicationPLAS'12 - Proceedings of Programming Languages and Analysis for Security
DOIs
StatePublished - 2012
Externally publishedYes
EventACM SIGPLAN 7th Workshop on Programming Languages and Analysis for Security, PLAS'12 - Beijing, China
Duration: Jun 15 2012Jun 15 2012

Publication series

NamePLAS'12 - Proceedings of Programming Languages and Analysis for Security

Conference

ConferenceACM SIGPLAN 7th Workshop on Programming Languages and Analysis for Security, PLAS'12
Country/TerritoryChina
CityBeijing
Period6/15/126/15/12

Keywords

  • D.2.0 [Software Engineering]: Protection Mechanisms
  • Languages
  • Security

Fingerprint

Dive into the research topics of 'Security-policy monitoring and enforcement with JavaMOP'. Together they form a unique fingerprint.

Cite this