A Survey of Access Control Misconfiguration Detection Techniques

Bingyu Shen
DOI: https://doi.org/10.48550/arXiv.2304.07704
2023-04-16
Cryptography and Security
Abstract:Access control mechanisms have been adopted in many real-world systems to control resource sharing for the principals in the system. An error in the access control policy (misconfiguration) can easily cause severe data leakage and system exploitation. Researchers have developed several methodologies to detect the access control misconfigurations through data mining, testing, and verification for various applications. This survey will study the line of works to detect access control misconfigurations and discuss some future research directions.
What problem does this paper attempt to address?