Reachability Analysis For Aws-Based Networks

John Backes,Sam Bayless,Byron Cook,Catherine Dodge,Andrew Gacek,Alan J. Hu,Temesghen Kahsai, Bill Kocik,Evgenii Kotelnikov, Jure Kukovec, Sean McLaughlin, Jason Reed,Neha Rungta, John Sizemore, Mark A. Stalzer, Preethi Srinivasan,Pavle Subotic,Carsten Varming, Blake Whaley

COMPUTER AIDED VERIFICATION, CAV 2019, PT II(2019)

引用 53|浏览151
暂无评分
摘要
Cloud services provide the ability to provision virtual networked infrastructure on demand over the Internet. The rapid growth of these virtually provisioned cloud networks has increased the demand for automated reasoning tools capable of identifying misconfigurations or security vulnerabilities. This type of automation gives customers the assurance they need to deploy sensitive workloads. It can also reduce the cost and time-to-market for regulated customers looking to establish compliance certification for cloud-based applications. In this industrial case-study, we describe a new network reachability reasoning tool, called Twos, that uses off-the-shelf automated theorem proving tools to fill this need. Twos is the foundation of a recently introduced network security analysis feature in the Amazon Inspector service now available to millions of customers building applications in the cloud. Twos is also used within Amazon Web Services (AWS) to automate the checking of compliance certification and adherence to security invariants for many AWS services that build on existing AWS networking features.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要