×

System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies

  • US 8,572,727 B2
  • Filed: 11/23/2009
  • Issued: 10/29/2013
  • Est. Priority Date: 11/23/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for enforcement of access-control and integrity policies in a computing system, the method comprising:

  • detecting security-sensitive sinks in software code for an application running on the computing system, each detected security-sensitive sink comprising at least one variable, each variable comprising a plurality of values;

    retrieving the access-control policy from a database accessible to the computing system, the access-control policy mapping a set of access permissions within the computing system to each one of a plurality of principals;

    determining, for all detected security-sensitive sinks, all influencing principals by identifying all principals located within a current call stack associated with each detected security-sensitive sink and all principals both within the current call stack and outside the current call stack from which the plurality of values are obtained that are read into the at least one variable of each detected security-sensitive sink;

    assigning a permission label to the at least one variable, each permission label comprising a set of access permissions granted to each value within the at least one variable;

    assigning an overall access permission to each detected security-sensitive-sink by taking the intersection of the set of access permissions for all influencing principals of the plurality of values of all variables of each detected security-sensitive sink; and

    reporting an integrity violation when the overall access permission for any one of the detected security-sensitive-sinks is insufficient to satisfy a demanded permission from a resource within the computing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×