79
Automated Symbolic Analysis of Security Policies Anh Truong Fondazione Bruno Kessler, Trento, Italia University of Trento, Italia Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 1 / 24

Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Automated Symbolic Analysis of Security Policies

Anh TruongFondazione Bruno Kessler, Trento, Italia

University of Trento, Italia

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 1 / 24

Page 2: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Plan of the Presentation

ContextSecurity ProblemASASP: an Automated Analysis Tool for Access Control PoliciesNew Heuristics:

Forward Useful ActionsOrdering the Actions

Conclusion

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 2 / 24

Page 3: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Context

Access Control: the process ofmediating requests to resources of a systemdetermining if a request should be granted/denied

=⇒ crucial for system security

Access Control policies specify which user can access whichresource (and how)

The design and management of access control are difficult,especially in large systems

Models (e.g., Role-Based Access Control)

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 3 / 24

Page 4: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Context

Access Control: the process ofmediating requests to resources of a systemdetermining if a request should be granted/denied

=⇒ crucial for system security

Access Control policies specify which user can access whichresource (and how)

The design and management of access control are difficult,especially in large systems

Models (e.g., Role-Based Access Control)

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 3 / 24

Page 5: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Context

Access Control: the process ofmediating requests to resources of a systemdetermining if a request should be granted/denied

=⇒ crucial for system security

Access Control policies specify which user can access whichresource (and how)

The design and management of access control are difficult,especially in large systems

Models (e.g., Role-Based Access Control)

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 3 / 24

Page 6: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Simplest Access Control Model

User PermissionAlice GrantTenureAlice AssignGradesAlice ReceiveHBenefitsAlice UseGymBob GrantTenureBob AssignGradesBob UseGymCharlie AssignGradesCharlie ReceiveHBenefitsCharlie UseGymDavid AssignHWScoresDavid Register4CoursesDavid UseGymEve ReceiveHBenefitsEve UseGymFred Register4CoursesFred UseGymGreg UseGym

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 3 / 24

Page 7: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Role-Based Access Control (RBAC)

Idea: decompose subject-object relationship using roles:

User Assignment (UA)User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Permission Assignment (PA)Role PermissionPCMember GrantTenurePCMember AssignGradesPCMember ReceiveHBenefitsPCMember UseGymFaculty AssignGradesFaculty ReceiveHBenefitsFaculty UseGymTA AssignHWScoresTA Register4CoursesTA UseGymUEmployee ReceiveHBenefitsUEmployee UseGymStudent Register4CoursesStudent UseGymUMember UseGym

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 4 / 24

Page 8: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Role-Based Access Control (RBAC)

Idea: decompose subject-object relationship using roles:

User Assignment (UA)User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Permission Assignment (PA)Role PermissionPCMember GrantTenurePCMember AssignGradesPCMember ReceiveHBenefitsPCMember UseGymFaculty AssignGradesFaculty ReceiveHBenefitsFaculty UseGymTA AssignHWScoresTA Register4CoursesTA UseGymUEmployee ReceiveHBenefitsUEmployee UseGymStudent Register4CoursesStudent UseGymUMember UseGym

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 4 / 24

Page 9: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Role-Based Access Control (RBAC)

Idea: decompose subject-object relationship using roles:

User Assignment (UA)User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Permission Assignment (PA)Role PermissionPCMember GrantTenurePCMember AssignGradesPCMember ReceiveHBenefitsPCMember UseGymFaculty AssignGradesFaculty ReceiveHBenefitsFaculty UseGymTA AssignHWScoresTA Register4CoursesTA UseGymUEmployee ReceiveHBenefitsUEmployee UseGymStudent Register4CoursesStudent UseGymUMember UseGym

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 4 / 24

Page 10: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Role-Based Access Control (RBAC)

The use of role hierarchies leads to a compact RBAC policies

User Assignment (UA)User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Permission Assignment (PA)Role PermissionPCMember GrantTenureFaculty AssignGradesTA AssignHWScoresUEmployee ReceiveHBenefitsStudent Register4CoursesUMember UseGym

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 4 / 24

Page 11: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Administrative RBAC

(A)RBAC model simplifies specification and administration ofaccess control policiesIdea: specify how RBAC policies are changed by administrativeactionsOur focus: ARBAC97

Administrative actions can only modify User Assignment

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 5 / 24

Page 12: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 13: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentGreg UMember

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 14: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentFred PTEmployeeGreg UMember

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 15: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentFred PTEmployeeGreg UMember

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 16: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 17: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 18: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TADavid StudentEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 19: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TAEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 20: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TAEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 21: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TAEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 22: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ARBAC97: URA97 sub-model

Role Assignment:Faculty : 〈+{Student},−{TA}〉 =⇒ ⊕PTEmpl .

PCMember : 〈+{PTEmpl .}, ∅〉 =⇒ ⊕Faculty

Role Revocation:Faculty : 〈+{Student}, ∅〉 =⇒ Student

Mutually Exclusive Roles (MER):MER(TA, PTEmployee)

Faculty : 〈+{Student}, ∅〉 =⇒ ⊕TA

Assign Fred to TA? No

User RoleAlice PCMemberBob FacultyCharlie FacultyDavid TAEve UEmployeeFred StudentFred PTEmployeeGreg UMemberFred Faculty

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 6 / 24

Page 23: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Analysis of Access Control Policies

Problem: Starting from an initial RBAC policy and using theadministrative actions in the ARBAC policy, is there a way toassign roles Student and Faculty to Fred? Yes: conflict=⇒Need for conflict analysisIn large systems (e.g., Dresdner bank: 40,000 users and 1,300roles), analysis of access control policies can be very difficult.To predict the effects of changes on policies of real-worldcomplexity by manual inspection is unfeasible.=⇒ Automated support needed!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 7 / 24

Page 24: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Analysis of Access Control Policies

Problem: Starting from an initial RBAC policy and using theadministrative actions in the ARBAC policy, is there a way toassign roles Student and Faculty to Fred? Yes: conflict=⇒Need for conflict analysisIn large systems (e.g., Dresdner bank: 40,000 users and 1,300roles), analysis of access control policies can be very difficult.To predict the effects of changes on policies of real-worldcomplexity by manual inspection is unfeasible.=⇒ Automated support needed!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 7 / 24

Page 25: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Analysis of Access Control Policies

Problem: Starting from an initial RBAC policy and using theadministrative actions in the ARBAC policy, is there a way toassign roles Student and Faculty to Fred? Yes: conflict=⇒Need for conflict analysisIn large systems (e.g., Dresdner bank: 40,000 users and 1,300roles), analysis of access control policies can be very difficult.To predict the effects of changes on policies of real-worldcomplexity by manual inspection is unfeasible.=⇒ Automated support needed!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 7 / 24

Page 26: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Analysis of Access Control Policies

Problem: Starting from an initial RBAC policy and using theadministrative actions in the ARBAC policy, is there a way toassign roles Student and Faculty to Fred? Yes: conflict=⇒Need for conflict analysisIn large systems (e.g., Dresdner bank: 40,000 users and 1,300roles), analysis of access control policies can be very difficult.To predict the effects of changes on policies of real-worldcomplexity by manual inspection is unfeasible.=⇒ Automated support needed!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 7 / 24

Page 27: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Analysis of Access Control Policies

Problem: Starting from an initial RBAC policy and using theadministrative actions in the ARBAC policy, is there a way toassign roles Student and Faculty to Fred? Yes: conflict=⇒Need for conflict analysisIn large systems (e.g., Dresdner bank: 40,000 users and 1,300roles), analysis of access control policies can be very difficult.To predict the effects of changes on policies of real-worldcomplexity by manual inspection is unfeasible.=⇒ Automated support needed!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 7 / 24

Page 28: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

ASASP: Automated Symbolic Analysis ofSecurity Policies Tool

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 8 / 24

Page 29: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

URA97: User-role Reachability Problem

Giveninitial RBAC policy 〈U,R,UA0〉a set administrative actions ψ = 〈role_assignment , role_revocation〉

Establish if a user u (∈ U) can be assigned to a role r (∈ R) byapplying a sequence of administrative actions in ψ

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 9 / 24

Page 30: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

URA97: User-role Reachability Problem

Giveninitial RBAC policy 〈U,R,UA0〉a set administrative actions ψ = 〈role_assignment , role_revocation〉

Establish if a user u (∈ U) can be assigned to a role r (∈ R) byapplying a sequence of administrative actions in ψ

Other Security analysis problems (e.g., Role containment,Weakest precondition...) can be reduced to User-role reachabilityproblem=⇒ User-role reachability problem is core problem in securityanalysis.

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 9 / 24

Page 31: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Available Analysis Tools

Features RBAC-PAT MOHAWK PMS VAC ASASP

MER constraints 7 7 7 7 3Unknown number of Users 7 7 7 3 3

Non-Separate Administration 7 7 3 3 3|Ca| > 1 7 7 7 7 3

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 10 / 24

Page 32: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach: Using a Decidable Fragment of(Many-sorted) First-order Logic

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 11 / 24

Page 33: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach: Using a Decidable Fragment of(Many-sorted) First-order Logic

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 11 / 24

Page 34: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Given symbolic representation ofTRBAC = theory specifying RBAC policiesI(ua) = initial RBAC policyG(ua) = a goal (e.g., user u is a member of role r )τ(ua,ua′) = administrative actions in ψ

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 35: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Given symbolic representation ofTRBAC = theory specifying RBAC policiesI(ua) = initial RBAC policyG(ua) = a goal (e.g., user u is a member of role r )τ(ua,ua′) = administrative actions in ψ

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 36: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Safety check:R0 ∧ I

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 37: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Safety check:R1 ∧ I

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 38: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Safety check:R2 ∧ I

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 39: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Safety check:R3 ∧ I

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 40: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 41: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Our Approach

Run a symbolic backward reachability procedureR0(ua) := G(ua)Ri+1(ua) := ∃ua′.(Ri(ua′) ∧ τ(ua,ua′)) (pre-image) for i ≥ 0

Initial States Goal States Backward Reachable States

Fix-point checkR4 ⇒ R3

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 12 / 24

Page 42: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

An automated analysis tool for Administrative RBAC policiesScalability: Heuristics

Useful actionsIncreasingly precise approximations of large policiesReuse of previous computation states

Initial results: ASASP outperforms MOHAWK and RBAC-PAT on theirbenchmarksVery recently, new tools VAC and PMS with their benchmarks areintroduced

ASASP seems to have bad behaviors with these benchmarks

⇒ need further heuristics

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 13 / 24

Page 43: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

An automated analysis tool for Administrative RBAC policiesScalability: Heuristics

Useful actionsIncreasingly precise approximations of large policiesReuse of previous computation states

Initial results: ASASP outperforms MOHAWK and RBAC-PAT on theirbenchmarksVery recently, new tools VAC and PMS with their benchmarks areintroduced

ASASP seems to have bad behaviors with these benchmarks

⇒ need further heuristics

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 13 / 24

Page 44: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

An automated analysis tool for Administrative RBAC policiesScalability: Heuristics

Useful actionsIncreasingly precise approximations of large policiesReuse of previous computation states

Initial results: ASASP outperforms MOHAWK and RBAC-PAT on theirbenchmarksVery recently, new tools VAC and PMS with their benchmarks areintroduced

ASASP seems to have bad behaviors with these benchmarks

⇒ need further heuristics

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 13 / 24

Page 45: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

An automated analysis tool for Administrative RBAC policiesScalability: Heuristics

Useful actionsIncreasingly precise approximations of large policiesReuse of previous computation states

Initial results: ASASP outperforms MOHAWK and RBAC-PAT on theirbenchmarksVery recently, new tools VAC and PMS with their benchmarks areintroduced

ASASP seems to have bad behaviors with these benchmarks

⇒ need further heuristics

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 13 / 24

Page 46: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP

ASASP with new HeuristicsForward Useful ActionsOrdering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 14 / 24

Page 47: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Recall: Useful Actions

Let ψ be administrative actions and Rg a set of roles:An action τ ∈ ψ is 0-useful iff its target role is in Rgτ is k-useful (for k > 0) iff it is:

(k − 1)-useful or,its target role occurs (possibly negated) in the simple pre-condition ofa (k − 1)-useful action

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 15 / 24

Page 48: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Recall: Useful Actions

Given ψ:ra : 〈+{r1}, ∅〉 =⇒ ⊕r2ra : 〈+{r2}, ∅〉 =⇒ ⊕r3ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5ra : 〈+{r1}, ∅〉 =⇒ r1ra : 〈+{r2}, ∅〉 =⇒ r2Goal: r5

1 ψ≤0 := {ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5}2 ψ≤1 := ψ≤0 ∪ {ra : 〈+{r1}, ∅〉 =⇒ ⊕r2}3 ψ≤2 := ψ≤1 ∪ {ra : 〈+{r1}, ∅〉 =⇒ r1}4 Stop since fix-point reached: ψ≤k = ψ≤2 for k > 2

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 16 / 24

Page 49: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Recall: Useful Actions

Given ψ:ra : 〈+{r1}, ∅〉 =⇒ ⊕r2ra : 〈+{r2}, ∅〉 =⇒ ⊕r3ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5ra : 〈+{r1}, ∅〉 =⇒ r1ra : 〈+{r2}, ∅〉 =⇒ r2Goal: r5

1 ψ≤0 := {ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5}2 ψ≤1 := ψ≤0 ∪ {ra : 〈+{r1}, ∅〉 =⇒ ⊕r2}3 ψ≤2 := ψ≤1 ∪ {ra : 〈+{r1}, ∅〉 =⇒ r1}4 Stop since fix-point reached: ψ≤k = ψ≤2 for k > 2

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 16 / 24

Page 50: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Recall: Useful Actions

Given ψ:ra : 〈+{r1}, ∅〉 =⇒ ⊕r2ra : 〈+{r2}, ∅〉 =⇒ ⊕r3ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5ra : 〈+{r1}, ∅〉 =⇒ r1ra : 〈+{r2}, ∅〉 =⇒ r2Goal: r5

1 ψ≤0 := {ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5}2 ψ≤1 := ψ≤0 ∪ {ra : 〈+{r1}, ∅〉 =⇒ ⊕r2}3 ψ≤2 := ψ≤1 ∪ {ra : 〈+{r1}, ∅〉 =⇒ r1}4 Stop since fix-point reached: ψ≤k = ψ≤2 for k > 2

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 16 / 24

Page 51: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Recall: Useful Actions

Given ψ:ra : 〈+{r1}, ∅〉 =⇒ ⊕r2ra : 〈+{r2}, ∅〉 =⇒ ⊕r3ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5ra : 〈+{r1}, ∅〉 =⇒ r1ra : 〈+{r2}, ∅〉 =⇒ r2Goal: r5

1 ψ≤0 := {ra : 〈+{r2},−{r4}〉 =⇒ ⊕r5}2 ψ≤1 := ψ≤0 ∪ {ra : 〈+{r1}, ∅〉 =⇒ ⊕r2}3 ψ≤2 := ψ≤1 ∪ {ra : 〈+{r1}, ∅〉 =⇒ r1}4 Stop since fix-point reached: ψ≤k = ψ≤2 for k > 2

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 16 / 24

Page 52: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Forward Useful Actions

backward vs. forward useful actionsLet ψ be administrative actions and Ri a set of roles presenting inUA0:

τ ∈ ψ is forward 0-useful iff its pre-condition is a subset of Riτ is forward k-useful (for k > 0) iff it is:

(k − 1)-useful or,its pre-condition is a subset of Ri = Ri ∪ {r | r is the target role of a(k − 1)-useful action}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 17 / 24

Page 53: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Forward Useful Actions

backward vs. forward useful actionsLet ψ be administrative actions and Ri a set of roles presenting inUA0:

τ ∈ ψ is forward 0-useful iff its pre-condition is a subset of Riτ is forward k-useful (for k > 0) iff it is:

(k − 1)-useful or,its pre-condition is a subset of Ri = Ri ∪ {r | r is the target role of a(k − 1)-useful action}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 17 / 24

Page 54: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Forward Useful Actions

backward vs. forward useful actionsLet ψ be administrative actions and Ri a set of roles presenting inUA0:

τ ∈ ψ is forward 0-useful iff its pre-condition is a subset of Riτ is forward k-useful (for k > 0) iff it is:

(k − 1)-useful or,its pre-condition is a subset of Ri = Ri ∪ {r | r is the target role of a(k − 1)-useful action}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 17 / 24

Page 55: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Integrating to ASASP

Compute ψB by using backward useful actionsCompute ψF by using forward useful actionsSolve the user-role reachability with the set ψ′ = ψB ∩ ψF ofactions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 18 / 24

Page 56: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 57: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 58: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 59: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 60: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 61: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 62: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 63: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

⇒ Ordering Actions in ψ

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 19 / 24

Page 64: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Consider the “difference” between two sets of statesDefine

Diff (C1,C2) = (P1 \ P2) ∪ (N1 \ N2)whereC1 = P1|N1, C2 = P2|N2 are pre-conditions,P1, P2 (N1, N2) are sets of roles of the form +r (−r , resp.)

Example: let C1 = {+r1,+r2| − r4} and C2 = {+r1,+r3| − r4,−r2}Diff (C1,C2) = {+r2}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 20 / 24

Page 65: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Consider the “difference” between two sets of statesDefine

Diff (C1,C2) = (P1 \ P2) ∪ (N1 \ N2)whereC1 = P1|N1, C2 = P2|N2 are pre-conditions,P1, P2 (N1, N2) are sets of roles of the form +r (−r , resp.)

Example: let C1 = {+r1,+r2| − r4} and C2 = {+r1,+r3| − r4,−r2}Diff (C1,C2) = {+r2}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 20 / 24

Page 66: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Consider the “difference” between two sets of statesDefine

Diff (C1,C2) = (P1 \ P2) ∪ (N1 \ N2)whereC1 = P1|N1, C2 = P2|N2 are pre-conditions,P1, P2 (N1, N2) are sets of roles of the form +r (−r , resp.)

Example: let C1 = {+r1,+r2| − r4} and C2 = {+r1,+r3| − r4,−r2}Diff (C1,C2) = {+r2}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 20 / 24

Page 67: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Consider the “difference” between two sets of statesDefine

Diff (C1,C2) = (P1 \ P2) ∪ (N1 \ N2)whereC1 = P1|N1, C2 = P2|N2 are pre-conditions,P1, P2 (N1, N2) are sets of roles of the form +r (−r , resp.)

Example: let C1 = {+r1,+r2| − r4} and C2 = {+r1,+r3| − r4,−r2}Diff (C1,C2) = {+r2}

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 20 / 24

Page 68: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Let ψ be the set of actions and Ci represent the “pre-condition” ofinitial states UA0 (i.e., all roles in UA0 are in Ci )

1 For each τ = (Ca : C → ⊗r) ∈ ψ:2 If true ∈ Ca and true ∈ C:

3 set τ be the highest order in ψ′

4 Else:5 Calculate Diff (Ca ∪ C,Ci) for τ

6 Order the actions by cardinality of their Diff (from lower value tohigher one)

7 If |Diffτ1 | = |Diffτ2| where τ1 = (Ca1 : C1 → ⊗r1) andτ2 = (Ca2 : C2 → ⊗r2):

8 τ1 has higher order if |Ca1 ∪ C1| < |Ca2 ∪ C2| and vice versa

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 21 / 24

Page 69: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

New Heuristics: Ordering the Actions

Let ψ be the set of actions and Ci represent the “pre-condition” ofinitial states UA0 (i.e., all roles in UA0 are in Ci )

1 For each τ = (Ca : C → ⊗r) ∈ ψ:2 If true ∈ Ca and true ∈ C:

3 set τ be the highest order in ψ′

4 Else:5 Calculate Diff (Ca ∪ C,Ci) for τ

6 Order the actions by cardinality of their Diff (from lower value tohigher one)

7 If |Diffτ1 | = |Diffτ2| where τ1 = (Ca1 : C1 → ⊗r1) andτ2 = (Ca2 : C2 → ⊗r2):

8 τ1 has higher order if |Ca1 ∪ C1| < |Ca2 ∪ C2| and vice versa

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 21 / 24

Page 70: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP: Experimental Setting

Experiments:Data sets: 4 packages from MOHAWK, VAC, PMSrandomly generated test cases inspired by real case studies widelyadopted by the community such as: a Hospital, a University, and anEuropean Bank

MOHAWK performs better than RBAC-PAT (RBAC-PAT does notscale up to handle these benchmarks)

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 22 / 24

Page 71: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

ASASP: Experimental Setting

Experiments:Data sets: 4 packages from MOHAWK, VAC, PMSrandomly generated test cases inspired by real case studies widelyadopted by the community such as: a Hospital, a University, and anEuropean Bank

MOHAWK performs better than RBAC-PAT (RBAC-PAT does notscale up to handle these benchmarks)

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 22 / 24

Page 72: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

MOHAWK’s Testcases: Separate AdministrationAssumption I

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 73: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

MOHAWK’s Testcases: Separate AdministrationAssumption II

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 74: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

MOHAWK’s Testcases: Separate AdministrationAssumption III

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 75: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

VAC’s Testcases: Separate Administration Assumption

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 76: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

VAC’s Testcases: Non-Separate AdministrationAssumption

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 77: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

PMS’s Testcases: Non-Separate AdministrationAssumption

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 23 / 24

Page 78: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Conclusion

Security analysis of Access Control PoliciesASASP: solve the user-role reachability problems for ARBACpolicies.New heuristics for ASASP

Backward Useful ActionsOrdering Actions

Current works:Solve user-role reachability problems for Administrative TemporalRBAC policiesAn incremental version of the approachProposed pre-processing role hierarchies strategies

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 24 / 24

Page 79: Automated Symbolic Analysis of Security Policies - FBKPlan of the Presentation Context Security Problem ASASP: an Automated Analysis Tool for Access Control Policies New Heuristics:

Thank you for your attention!

Anh Truong (FBK & UNITN) Automated Analysis of Security Policies 24 / 24