Article (Périodiques scientifiques)
Automated Reverse Engineering of Role-based Access Control Policies of Web Applications
LE, Ha Thanh; SHAR, Lwin Khin; BIANCULLI, Domenico et al.
2022In Journal of Systems and Software, 184, p. 111109
Peer reviewed vérifié par ORBi
 

Documents


Texte intégral
main.pdf
Preprint Auteur (737.31 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Access control; testing; reverse engineering
Résumé :
[en] Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and detecting AC defects. In this paper, we present a semi-automated framework for reverse-engineering of AC policies from Web applications. Our goal is to learn and recover role-based access control (RBAC) policies from implementations, which are then used to validate implemented policies and detect AC issues. Our framework, built on top of a suite of security tools, automatically explores a given Web application, mines domain input specifications from access logs, and systematically generates and executes more access requests using combinatorial test generation. To learn policies, we apply machine learning on the obtained data to characterize relevant attributes that influence AC. Finally, the inferred policies are presented to the security engineer, for validation with respect to intended access rights and for detecting AC issues. Inconsistent and insufficient policies are highlighted as potential AC issues, being either vulnerabilities or implementation errors. We evaluated our approach on four Web applications (three open-source and a proprietary one built by our industry partner) in terms of the correctness of inferred policies. We also evaluated the usefulness of our approach by investigating whether it facilitates the detection of AC issues. The results show that 97.8% of the inferred policies are correct with respect to the actual AC implementation; the analysis of these policies led to the discovery of 64 AC issues that were reported to the developers.
Centre de recherche :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Software Verification and Validation Lab (SVV Lab)
Disciplines :
Sciences informatiques
Auteur, co-auteur :
LE, Ha Thanh ;  Eltien & Co
SHAR, Lwin Khin ;  Singapore Management University
BIANCULLI, Domenico  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SVV
BRIAND, Lionel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SVV
NGUYEN, Duy Cu ;  POST Luxembourg
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Automated Reverse Engineering of Role-based Access Control Policies of Web Applications
Date de publication/diffusion :
février 2022
Titre du périodique :
Journal of Systems and Software
ISSN :
0164-1212
eISSN :
1873-1228
Maison d'édition :
Elsevier, Pays-Bas
Volume/Tome :
184
Pagination :
111109
Peer reviewed :
Peer reviewed vérifié par ORBi
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR3949772 - Validation And Verification Laboratory, 2010 (01/01/2012-31/07/2018) - Lionel Briand
Organisme subsidiant :
FNR - Fonds National de la Recherche
Disponible sur ORBilu :
depuis le 29 septembre 2021

Statistiques


Nombre de vues
345 (dont 23 Unilu)
Nombre de téléchargements
496 (dont 1 Unilu)

citations Scopus®
 
16
citations Scopus®
sans auto-citations
16
OpenCitations
 
1
citations OpenAlex
 
16
citations WoS
 
6

Bibliographie


Publications similaires



Contacter ORBilu