skip to main content
10.1145/1036921.1036931acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Modeling insecurity: policy engineering for survivability

Published:31 October 2003Publication History

ABSTRACT

We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ways. First, we contend that traditional safety-property modeling cannot provide any guarantees when the policy enforcement mechanisms are compromised. Therefore, we extend traditional access control specifications by modeling insecure states and transitions explicitly, to describe possible system behavior after compromise.

Next, we observe that it may not always possible to recover from an insecure state, and both compromise and recovery impact the availability of information. Based on these observations, we refine traditional information security properties as liveness assertions and explicitly add recovery actions to our specifications, to guarantee resources are available to legitimate users infinitely often, in spite of malicious attacks or inadvertent compromise. We explain our process using an example behavioral specification and show how we can define different measures of availability and verify them using standard model-checking techniques within this framework.

References

  1. P. Ammann, S. Jajodia, C. D. McCollum, and B. Blaustein. Surviving information warfare attacks on databases. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 164-174, Oakland, CA, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Avizienis, J. C. Laprie, and B. Randell. Fundamental concepts of dependability. In LAAS Report, April 2001.Google ScholarGoogle Scholar
  3. M. Bishop. Computer Security: Art and Science. Addison-Wesley, ISBN 0-201-44099-7, 2002.Google ScholarGoogle Scholar
  4. E. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT Press 2000.Google ScholarGoogle Scholar
  5. M. Cukier, T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, and J. Gossett. Providing intrusion tolerance with itua. In Supplement of the 2002 International Conference on Dependable Systems and Networks, June 2002.Google ScholarGoogle Scholar
  6. Y. Deswarte, L. Blain, and J. C. Fabre. Intrusion tolerance in distributed systems. In IEEE Symp. on Research in Security and Privacy, Oakland, CA USA, April 1991.Google ScholarGoogle Scholar
  7. B. Dutertre, H. Saïdi, and V. Stavridou. Intrusion-tolerant group management in enclaves. In International Conference on Dependable Systems and Networks (DSN'01), pages 203-212, Göteborg, Sweden, July 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead. Survivable network systems: An emerging discipline. In Technical Report CMU/SEI-97-153, November 1997.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. In Communications of the ACM, Vol 19(8), Aug 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Jha and J. Wing. Survivability analysis of networked systems. In International Conference on Software Engineering (ICSE), May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Liu and S. Jajodia. Trusted Recovery and Defensive Information Warfare. Kluwer Academic Publishers, ISBN 0-7923-7572-6, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Naldurg and R. Campbell. Specification and verification of network denial of service. Work in Progress.Google ScholarGoogle Scholar
  13. P. Naldurg and R. Campbell. Dynamic access control: Presperving safety and trust in computer network defense. In ACM Symposium on Access Control Models and Technologies, Como, Italy, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Panda and J. Giordano. Defensive information warfare. In Communications of the ACM, Vol. 42, No. 7, p. 31-32, July 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Wu, M. Malkin, and D. Boneh. Building intrusion tolerant applications. In Proceedings of the 8th USENIX Security Symposium, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Modeling insecurity: policy engineering for survivability

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SSRS '03: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
        October 2003
        129 pages
        ISBN:1581137842
        DOI:10.1145/1036921

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader