Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options
Title | Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kästner, Christian, Pfeffer, Jürgen |
Conference Name | Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC, USA |
ISBN Number | 978-1-4503-2907-1 |
Keywords | ACM CCS, certification, composability, Concurrency and Timing, configuration options, cyber security, Formal Methods and Theory of Security, Foundations, Logic and Verification, network analysis, science of security, security metrics, Validation and Verification |
Abstract | In highly configurable systems the configuration space is too big for (re-)certifying every configuration in isolation. In this project, we combine software analysis with network analysis to detect which configuration options interact and which have local effects. Instead of analyzing a system as Linux and SELinux for every combination of configuration settings one by one (>102000 even considering compile-time configurations only), we analyze the effect of each configuration option once for the entire configuration space. The analysis will guide us to designs separating interacting configuration options in a core system and isolating orthogonal and less trusted configuration options from this core. |
URL | http://doi.acm.org/10.1145/2600176.2600199 |
DOI | 10.1145/2600176.2600199 |
Citation Key | Kastner:2014:LRH:2600176.2600199 |
- Certification
- Concurrency and Timing
- ACM CCS
- certification
- composability
- concurrency and timing
- configuration options
- cyber security
- Formal Methods and Theory of Security
- foundations
- Logic and Verification
- network analysis
- Science of Security
- Security Metrics
- validation and verification
- ACM CCS
- Cyber Security
- Formal Methods and Theory of Security
- Logic and Verification