Towards Automatic Reverse Engineering of Software Security Configuration

dc.contributor.authorWang, Rui; Wang, XiaoFeng; Zhang, Kehuan; Li, Zhuowei
dc.date.accessioned2025-11-13T20:14:31Z
dc.date.available2025-11-13T20:14:31Z
dc.date.issued2008-07
dc.description.abstractThe specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such as misconfiguration detection. Such specifications, however, are often ill-documented, or even close because of the increasing use of graphic user interfaces to set program options. In this paper, we propose ConfigRE, a new technique for automatic reverse engineering of an application's access-control configurations. Our approach first partitions a configuration input into fields, and then identifies the semantic relations among these fields and the roles they play in enforcing an access control policy. Based upon such knowledge, ConfigRE automatically generates a specification language to describe the syntactic relations of these fields. The language can be converted into a scanner using standard parser generators for scanning configuration files and discovering the security policies specified in an application. We implemented ConfigRE in our research and evaluated it against real applications. The experiment results demonstrate the efficacy of our approach.
dc.identifier.urihttps://hdl.handle.net/2022/34508
dc.relation.ispartofseriesIndiana University Computer Science Technical Reports; TR667
dc.rightsThis work is protected by copyright unless stated otherwise.
dc.rights.uri
dc.titleTowards Automatic Reverse Engineering of Software Security Configuration

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR667.pdf
Size:
279.32 KB
Format:
Adobe Portable Document Format
Can’t use the file because of accessibility barriers? Contact us