Reference : Access Control Enforcement Testing
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/15844
Access Control Enforcement Testing
English
El Kateb, Donia mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > > ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Elrakaiby, Yehia mailto [> >]
Mouelhi, Tejeddine mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Le Traon, Yves mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
May-2012
8th International Workshop on Automation of Software Test (AST), 2013
64-70
Yes
No
International
8th International Workshop on Automation of Software Test (AST), 2013
from 18-05-2013 to 19-05-2013
San Francisco
USA
[en] authorisation ; program diagnostics ; program testing
[en] A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the correct enforcement of access control policies in a given target application. More specifically, we rely on a two folded approach where a static analysis of the target application is first made to identify the sensitive accesses that could be regulated by the policy. The dynamic analysis of the application is then conducted using mutation to verify for every sensitive access whether the policy is correctly enforced. The dynamic analysis of the application also gives the exact location of the PEP to enable fixing enforcement errors detected by the analysis. The approach has been validated using a case study implementing an access control policy.
http://hdl.handle.net/10993/15844

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
ast-2013-localisation-pep-final.pdfPublisher postprint772.05 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.