A modular pipeline for enforcement of security properties at runtime

R Taleb, S Hallé, R Khoury - Annals of Telecommunications, 2023 - Springer
Runtime enforcement ensures the respect of a user-specified security policy by a program
by providing a valid replacement for any misbehaving sequence of events that may occur …

From qualitative to quantitative enforcement of security policy

F Martinelli, I Matteucci, C Morisset - … St. Petersburg, Russia, October 17-19 …, 2012 - Springer
The problem of enforcing a security policy has been particularly well studied over the last
decade, following Schneider's seminal work on security automata. We first present in this …

A modular runtime enforcement model using multi-traces

R Taleb, S Hallé, R Khoury - … Symposium on Foundations and Practice of …, 2021 - Springer
Runtime enforcement seeks to provide a valid replacement to any misbehaving sequence of
events of a running system so that the correct sequence complies with a user-defined …

Tally kee**-LTL: An LTL semantics for quantitative evaluation of LTL specifications

R Khoury, S Hallé - … on Information Reuse and Integration (IRI), 2018 - ieeexplore.ieee.org
When monitoring a trace using an LTL specification, the verdict returned by the monitor can
often be insufficiently informative to be actionable. In this paper, we propose a …

Quantitative evaluation of enforcement strategies: Position paper

V Ciancia, F Martinelli, M Ilaria, C Morisset - International Symposium on …, 2013 - Springer
A security enforcement mechanism runs in parallel with a system to check and modify its run-
time behaviour, so that it satisfies some security policy. For each policy, several enforcement …

Probabilistic cost enforcement of security policies

Y Mallios, L Bauer, D Kaynar… - Journal of Computer …, 2015 - content.iospress.com
This paper presents a formal framework for run-time enforcement mechanisms, or monitors,
based on probabilistic input/output automata [Task-structured probabilistic I/O automata …

A multi-trace model for runtime enforcement and verification under uncertainty

R Taleb - 2024 - constellation.uqac.ca
Runtime Verification (RV) or Runtime Monitoring has gained increasing interest in recent
years [99]. It can be defined as the process of observing the behavior of a running system …

On security countermeasures ranking through threat analysis

N Nostro, I Matteucci, A Ceccarelli… - … Safety, Reliability, and …, 2014 - Springer
Security analysis and design are key activities for the protection of critical systems and
infrastructures. Traditional approaches consist first in applying a qualitative threat …

A theory of gray security policies

D Ray, J Ligatti - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
This paper generalizes traditional models of security policies, from specifications of whether
programs are secure, to specifications of how secure programs are. This is a generalization …

A unifying framework for dynamic monitoring and a taxonomy of optimizations

MC Jakobs, H Mantel - … Applications of Formal Methods, Verification and …, 2020 - Springer
Reducing the performance overhead of run-time monitoring is crucial for making it affordable
to enforce more complex requirements than simple security or safety properties …