Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2024
Proactive Real-Time First-Order Enforcement
AbstractModern software systems must comply with increasingly complex regulations in domains ranging from industrial automation to data protection. Runtime enforcement addresses this challenge by empowering systems to not only observe, but also actively ...
- posterMay 2024
Student Research Abstract: Enhancing Safety in Cyber-Physical Systems Through Runtime Enforcement
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1614–1616https://doi.org/10.1145/3605098.3635171The verification and safety assurance of cyber-physical systems pose significant challenges, necessitating innovative solutions for their deployment. Machine Learning (ML) has gained prominence for its diverse applications, particularly in autonomous ...
- research-articleNovember 2022
Industrial Control Systems Security via Runtime Enforcement
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 1Article No.: 4, Pages 1–41https://doi.org/10.1145/3546579With the advent of Industry 4.0, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, increasingly interconnected and therefore ...
- research-articleOctober 2022
Proactive libraries: enforcing correct behaviors in Android apps
ICSE '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion ProceedingsPages 159–163https://doi.org/10.1145/3510454.3516837The Android framework provides a rich set of APIs that can be exploited by developers to build their apps. However, the rapid evolution of these APIs jointly with the specific characteristics of the lifecycle of the Android components challenge ...
- research-articleDecember 2019
Controlling Interactions with Libraries in Android Apps Through Runtime Enforcement
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 14, Issue 2Article No.: 8, Pages 1–29https://doi.org/10.1145/3368087Android applications are executed on smartphones equipped with a variety of resources that must be properly accessed and controlled, otherwise the correctness of the executions and the stability of the entire environment might be negatively affected. ...
- research-articleOctober 2019Honorable Mention
Securing implantable medical devices with runtime enforcement hardware
MEMOCODE '19: Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System DesignArticle No.: 3, Pages 1–9https://doi.org/10.1145/3359986.3361200In recent years we have seen numerous proof-of-concept attacks on implantable medical devices such as pacemakers. Attackers aim to breach the strict operational constraints that these devices operate within, with the end-goal of compromising patient ...
- research-articleSeptember 2018
GUARDIA: specification and enforcement of javascript security policies without VM modifications
ManLang '18: Proceedings of the 15th International Conference on Managed Languages & RuntimesArticle No.: 17, Pages 1–15https://doi.org/10.1145/3237009.3237025The complex architecture of browser technologies and dynamic characteristics of JavaScript make it difficult to ensure security in client-side web applications. Browser-level security policies alone are not sufficient because it is difficult to apply ...
- research-articleJune 2017
Safety Guard: Runtime Enforcement for Safety-Critical Cyber-Physical Systems: Invited
DAC '17: Proceedings of the 54th Annual Design Automation Conference 2017Article No.: 84, Pages 1–6https://doi.org/10.1145/3061639.3072957Due to their safety-critical nature, cyber-physical systems (CPS) must tolerate faults and security attacks to remain fail-operational. However, conventional techniques for improving safety, such as testing and validation, do not meet this requirement, ...
- research-articleApril 2016
Predictive runtime enforcement
SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied ComputingPages 1628–1633https://doi.org/10.1145/2851613.2851827Runtime enforcement (RE) is a technique to ensure that the (untrustworthy) output of a black-box system satisfies some desired properties. In RE, the output of the running system, modeled as a stream of events, is fed into an enforcement monitor. The ...
- research-articleJanuary 2015
Runtime Enforcement of Security Policies on Black Box Reactive Programs
POPL '15: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming LanguagesPages 43–54https://doi.org/10.1145/2676726.2676978Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different strengths and weaknesses and hence it is important to understand the ...
Also Published in:
ACM SIGPLAN Notices: Volume 50 Issue 1 - tutorialNovember 2013
Easily instrumenting android applications for security purposes
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1499–1502https://doi.org/10.1145/2508859.2516759Novel types of malware on mobile devices have raised researchers interest in implementing static and dynamic techniques for detecting and mitigating malicious behavior of mobile applications. In this hands-on tutorial we will demonstrate and explain ...
- articleApril 2013
Modular Verification of Asynchronous Service Interactions Using Behavioral Interfaces
IEEE Transactions on Services Computing (ITSC), Volume 6, Issue 2Pages 262–275https://doi.org/10.1109/TSC.2011.55A crucial problem in service-oriented computing is the specification and analysis of interactions among multiple peers that communicate via messages. We propose a design pattern that enables the specification of behavioral interfaces acting as ...
- ArticleSeptember 2012
A quantitative approach for inexact enforcement of security policies
ISC'12: Proceedings of the 15th international conference on Information SecurityPages 306–321https://doi.org/10.1007/978-3-642-33383-5_19A run-time enforcement mechanism is a program in charge of ensuring that all the traces of a system satisfy a given security policy. Following Schneider's seminal work, there have been several approaches defining what kind of policies can be ...
- research-articleMarch 2012
Evolution of composition filters to event composition
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied ComputingPages 1850–1857https://doi.org/10.1145/2245276.2232080Various different aspect-oriented (AO) languages are introduced in the literature, and naturally are evolved due to the research activities and the experiences gained in applying them to various domains. Achieving modularity, composability and ...
- ArticleFebruary 2012
Runtime enforcement of information flow security in tree manipulating processes
ESSoS'12: Proceedings of the 4th international conference on Engineering Secure Software and SystemsPages 46–59https://doi.org/10.1007/978-3-642-28166-2_6We consider the problem of enforcing information flow policies in Xml manipulating programs such as Web services and business processes implemented in current workflow languages. We propose a runtime monitor that can enforce the secrecy of freely chosen ...
- research-articleMarch 2009
Enforcement monitoring wrt. the safety-progress classification of properties: NOTE: ACM has found that the authors of this paper failed to cite a work they previously published with much identical content entitled Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. Published in December 2008 in the Springer LNCS series for the ICISS 2008 conference
SAC '09: Proceedings of the 2009 ACM symposium on Applied ComputingPages 593–600https://doi.org/10.1145/1529282.1529408Runtime enforcement is a powerful technique to ensure that a program will respect a given set of properties. We extend previous works on this topic in several directions. Firstly, we propose a generic notion of enforcement monitors based on a memory ...
- ArticleDecember 2008
Automatic Generation and Enforcement of Security Contract for Pervasive Application
EUC '08: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02Pages 55–60https://doi.org/10.1109/EUC.2008.29Pervasive computing is providing its usability and scope in almost every aspect nowadays. In order to make better use of pervasive services in nomadic devices, pervasive client download might be needed, which would result in serious security problems ...