algorithm the working-set-based approach of WSDEP-
SEARCH leads to significantly better EST values and
thus, under consideration of the ESC values, to a simi-
lar significant improvement of the overall runtime.
5 CONCLUSIONS
This paper addresses the exponential time complexity
problem of heuristic algorithms for the safety analysis
of dynamic AC models with large parameter spaces.
While former heuristics identify well-hidden command
sequences in which each command establishes the pre-
conditions of its subsequent command until a target
right is leaked, the selection of corresponding com-
mand parameter values is neither effective nor efficient
resulting in over 90 % of the total analysis runtime.
To drastically reduce this weakness, we present
WSDEPSEARCH which adapts the idea of working
sets known from page replacement algorithms by
strictly limiting the the parameter value space to only
those cells of the ACM that offer a high potential for
a command sequence to contribute to a right leakage.
The implementation of the heuristic analysis algorithm
was integrated into our security policy engineering
framework WorSE. The evaluation shows a runtime
improvement up to 4 orders of magnitude which makes
analyses of automaton-based AC models with realistic
state transition schemes and model state sizes encom-
passing more than 10
7
ACM cells tractable.
REFERENCES
Amthor, P. (2015). A Uniform Modeling Pattern for Operat-
ing Systems Access Control Policies with an Applica-
tion to SELinux. In Proc. 12th Int. Conf. on Secur. and
Crypt., pages 88–99.
Amthor, P. (2017). Efficient Heuristic Safety Analysis of
Core-based Security Policies. In Proc. 14th Int. Conf.
on Secur. and Crypt., pages 384–392.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2013). Heuris-
tic Safety Analysis of Access Control Models. In Proc.
18th ACM Symp. on Access Control Models and Tech-
nol., pages 137–148.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2014).
WorSE: A Workbench for Model-based Security Engi-
neering. Comp. & Secur., 42:40–55.
Barker, S. (2009). The Next 700 Access Control Models or
a Unifying Meta-Model? In Proc. 14th ACM Symp. on
Access Control Models and Technol., pages 187–196.
Basin, D., Clavel, M., and Egea, M. (2011). A Decade of
Model-Driven Security. In Proc. 16th ACM Symp. on
Access Control Models and Technol., pages 1–10.
Carr, R. W. and Hennessy, J. L. (1981). WSClock – A
Simple and Effective Algorithm for Virtual Memory
Management. In Proc. 8th Symp. on Operating Syst.
Principles, pages 87–95.
Denning, P. J. (1968). The Working Set Model for Program
Behaviour. Comm. of the ACM, 11(5):323–333.
Evered, M. and B
¨
ogeholz, S. (2004). A Case Study in Access
Control Requirements for a Health Information System.
In Proc. Austral. Inf. Secur. Workshop, pages 53–61.
Gofman, M. I., Ramakrishnan, C. R., Stoller, S. D., et al.
(2009). Parameterized PRBAC and ARBAC Policies
for a Small Health Care Facility.
Goguen, J. A. and Meseguer, J. (1982). Security Policies
and Security Models. In Proc. IEEE Symp. on Secur.
and Priv., pages 11–20.
Harrison, M. A. and Ruzzo, W. L. (1978). Monotonic Protec-
tion Systems. In Found. of Sec. Comp., pages 337–365.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1975).
On Protection in Operating Systems. Oper. Syst. Rev.,
9(5):14–24.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. Comm. of the ACM,
19(8):461–471.
Jha, S., Li, N., Tripunitara, M. V., Wang, Q., et al. (2008).
Towards Formal Verification of Role-Based Access
Control Policies. IEEE Trans. on Dep. and Sec. Comp.,
5(4):242–255.
K
¨
uhnhauser, W. E. and P
¨
olck, A. (2011). Towards Access
Control Model Engineering. In Proc. 7th Int. Conf. on
Inf. Syst. Secur., volume 7093, pages 379–382.
Li, N. and Tripunitara, M. V. (2006). Security Analysis in
Role-Based Access Control. ACM Trans. on Inf. and
Syst. Secur., 9(4):391–420.
Lipton, R. J. and Snyder, L. (1977). A Linear Time Algo-
rithm for Deciding Subject Security. Journal of the
ACM, 24(3):455–464.
Mondal, S., Sural, S., and Atluri, V. (2009). Towards Formal
Security Analysis of GTRBAC Using Timed Automata.
In Proc. 14th ACM Symp. on Access Control Models
and Technol., pages 33–42.
Ranise, S., Truong, A., and Armando, A. (2014). Scal-
able and Precise Automated Analysis of Administrative
Temporal Role-based Access Control. In Proc. 19th
ACM Symp. on Access Control Models and Technol.,
pages 103–114.
Sandhu, R., Bhamidipati, V., and Munawer, Q. (1999). The
ARBAC97 Model for Role-based Administration of
Roles. ACM Trans. on Inf. and Syst. Secur., 2(1):105–
135.
Sandhu, R. S. (1992). The Typed Access Matrix Model.
In Proc. IEEE Symp. on Research in Secur. and Priv.,
pages 122–136.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., et al. (1996).
Role-Based Access Control Models. IEEE Comp.,
29(2):38–47.
Sasturkar, A., Yang, P., Stoller, S. D., et al. (2011). Pol-
icy Analysis for Administrative Role-Based Access
Control. Theor. Comp. Sci., 412(44):6208–6234.
Schlegel, M. and Amthor, P. (2020). Beyond Administration:
A Modeling Scheme Supporting the Dynamic Analysis
of Role-based Access Control Policies. In Proc. 17th
Int. Conf. on Secur. and Crypt. (to appear).
Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control Models
531