Compositional runtime enforcement revisited

被引:0
|
作者
Pinisetty, Srinivas [1 ]
Pradhan, Ankit [1 ]
Roop, Partha [2 ]
Tripakis, Stavros [3 ]
机构
[1] IIT Bhubaneswar, Bhubaneswar, India
[2] Univ Auckland, Auckland, New Zealand
[3] Northeastern Univ, Khoury Coll Comp Sci, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Runtime monitoring; Runtime enforcement; Compositionality; Monitor synthesis; TIMED PROPERTIES; SYSTEMS;
D O I
10.1007/s10703-022-00401-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Runtime enforcement is a methodology used to enforce that the output of a running system satisfies a desired property. Given a property, an enforcement monitor modifies an (untrusted) sequence of events into a sequence that complies to that property. In practice, we may have not one, but many properties to enforce. Moreover, new properties may arise as new capabilities are added to the system. It is thus important to construct not a single, i.e., monolithic monitor, but rather several monitors, one for each property. The question is to what extent such monitors can be composed, and how. In this paper, we study two enforcement monitor composition schemes, serial and parallel composition. We show that, runtime enforcement is compositional for general regular properties with respect to one of the parallel composition schemes defined. We also show that runtime enforcement is not compositional with respect to serial composition for general regular properties, but it is for certain subclasses of regular properties. The proposed compositional runtime enforcement framework is formalized and implemented. Our experimental results demonstrate the pros and cons of using the compositional approach versus the monolithic with respect to performance.
引用
收藏
页码:205 / 252
页数:48
相关论文
共 50 条
  • [41] Enforcement and validation (at runtime) of various notions of opacity
    Falcone, Ylies
    Marchand, Herve
    DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2015, 25 (04): : 531 - 570
  • [42] Enforcement and validation (at runtime) of various notions of opacity
    Yliès Falcone
    Hervé Marchand
    Discrete Event Dynamic Systems, 2015, 25 : 531 - 570
  • [43] An Android runtime security policy enforcement framework
    Security Engineering Research Group , Institute of Management Sciences, 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan
    不详
    Pers. Ubiquitous Comp., 6 (631-641):
  • [44] Modeling runtime enforcement with mandatory results automata
    Egor Dolzhenko
    Jay Ligatti
    Srikar Reddy
    International Journal of Information Security, 2015, 14 : 47 - 60
  • [45] Critical Infrastructures Security Modeling, Enforcement and Runtime Checking
    El Kalam, Anas Abou
    Deswarte, Yves
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 95 - +
  • [46] Efficient Runtime-Enforcement Techniques for Policy Weaving
    Joiner, Richard
    Reps, Thomas
    Jha, Somesh
    Dhawan, Mohan
    Ganapathy, Vinod
    22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 224 - 234
  • [47] Runtime Enforcement of Web Service Message Contracts with Data
    Halle, Sylvain
    Villemaire, Roger
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 192 - 206
  • [48] Securing Implantable Medical Devices with Runtime Enforcement Hardware
    Pearce, Hammond
    Kuo, Matthew M. Y.
    Roop, Partha S.
    Pinisetty, Srinivas
    17TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2019,
  • [49] Industrial Control Systems Security via Runtime Enforcement
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (01)
  • [50] DIOXIN: runtime security policy enforcement of fog applications
    Russo, Enrico
    Verderame, Luca
    Armando, Alessandro
    Merlo, Alessio
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (02) : 126 - 138