Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Disjunctive Information Flow for Communicating Processes

verfasst von : Ximeng Li, Flemming Nielson, Hanne Riis Nielson, Xinyu Feng

Erschienen in: Trustworthy Global Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security validation of practical computer systems calls for the ability to specify and verify information flow policies that are dependent on data content. Such policies play an important role in concurrent, communicating systems: consider a scenario where messages are sent to different processes according to their tagging. We devise a security type system that enforces content-dependent information flow policies in the presence of communication and concurrency. The type system soundly guarantees a compositional noninterference property. All theoretical results have been formally proved in the Coq proof assistant [9].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
This pattern is reminiscent of the “Weak bisimulation up to H" by Focardi and Rossi [14].
 
Literatur
1.
Zurück zum Zitat Amtoft, T., Dodds, J., Zhang, Z., Appel, A., Beringer, L., Hatcliff, J., Ou, X., Cousino, A.: A certificate infrastructure for machine-checked proofs of conditional information flow. In: Degano, P., Guttman, J.D. (eds.) Principles of Security and Trust. LNCS, vol. 7215, pp. 369–389. Springer, Heidelberg (2012)CrossRef Amtoft, T., Dodds, J., Zhang, Z., Appel, A., Beringer, L., Hatcliff, J., Ou, X., Cousino, A.: A certificate infrastructure for machine-checked proofs of conditional information flow. In: Degano, P., Guttman, J.D. (eds.) Principles of Security and Trust. LNCS, vol. 7215, pp. 369–389. Springer, Heidelberg (2012)CrossRef
2.
Zurück zum Zitat Apt, K.R.: Ten years of Hoare’s logic: A survey - part 1. ACM Trans. Program. Lang. Syst. 3(4), 431–483 (1981)CrossRefMATH Apt, K.R.: Ten years of Hoare’s logic: A survey - part 1. ACM Trans. Program. Lang. Syst. 3(4), 431–483 (1981)CrossRefMATH
3.
Zurück zum Zitat Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS 2009, pp. 113–124 (2009) Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS 2009, pp. 113–124 (2009)
4.
Zurück zum Zitat Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013 (2013) Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013 (2013)
5.
Zurück zum Zitat Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theoret. Comput. Sci. 281(1), 109–130 (2002)CrossRefMathSciNetMATH Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theoret. Comput. Sci. 281(1), 109–130 (2002)CrossRefMathSciNetMATH
6.
Zurück zum Zitat Broberg, N., Sands, D.: Paralocks: role-based informationflow control and beyond. In: POPL 2010, pp. 431–444 (2010) Broberg, N., Sands, D.: Paralocks: role-based informationflow control and beyond. In: POPL 2010, pp. 431–444 (2010)
7.
Zurück zum Zitat Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: S&P 2008, pp. 354–368 (2008) Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: S&P 2008, pp. 354–368 (2008)
8.
Zurück zum Zitat Cohen, E.S.: Information transmission in computational systems. In: SOSP 1977 (1977) Cohen, E.S.: Information transmission in computational systems. In: SOSP 1977 (1977)
10.
Zurück zum Zitat Dam, M.: Decidability and proof systems for language-based noninterference relations. In: POPL 2006 (2006) Dam, M.: Decidability and proof systems for language-based noninterference relations. In: POPL 2006 (2006)
11.
Zurück zum Zitat Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)CrossRefMATH Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)CrossRefMATH
12.
Zurück zum Zitat Eggert, S., van der Meyden, R., Schnoor, H., Wilke, T.: The complexity of intransitive noninterference. In: S&P 2011, pp. 196–211 (2011) Eggert, S., van der Meyden, R., Schnoor, H., Wilke, T.: The complexity of intransitive noninterference. In: S&P 2011, pp. 196–211 (2011)
14.
Zurück zum Zitat Focardi, R., Rossi, S.: Information flow security in dynamic contexts. In: (CSFW 2002), pp. 307–319 (2002) Focardi, R., Rossi, S.: Information flow security in dynamic contexts. In: (CSFW 2002), pp. 307–319 (2002)
15.
Zurück zum Zitat Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in javascript and its APIs. In: SAC 2014, pp. 1663–1671 (2014) Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in javascript and its APIs. In: SAC 2014, pp. 1663–1671 (2014)
16.
Zurück zum Zitat Hedin, D., Sabelfeld, A.: A perspective on information-flow control. In: Software Safety and Security - Tools for Analysis and Verification, pp. 319–347 (2012) Hedin, D., Sabelfeld, A.: A perspective on information-flow control. In: Software Safety and Security - Tools for Analysis and Verification, pp. 319–347 (2012)
17.
Zurück zum Zitat Jones, C.B.: Development Methods for Computer Programs including a Notion of Interference. Ph.D. thesis, Oxford University, June 1981 Jones, C.B.: Development Methods for Computer Programs including a Notion of Interference. Ph.D. thesis, Oxford University, June 1981
18.
Zurück zum Zitat Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: A static analysis tool for detecting web application vulnerabilities, p. 6 (2006) Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: A static analysis tool for detecting web application vulnerabilities, p. 6 (2006)
20.
Zurück zum Zitat Lourenço, L., Caires, L.: Dependent information flow types. In: POPL 2015 (2015) Lourenço, L., Caires, L.: Dependent information flow types. In: POPL 2015 (2015)
21.
Zurück zum Zitat Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Comput. Secur. 11(4), 615–676 (2003) Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Comput. Secur. 11(4), 615–676 (2003)
22.
Zurück zum Zitat Mantel, H., Sudbrock, H.: Flexible scheduler-independent security. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 116–133. Springer, Heidelberg (2010)CrossRef Mantel, H., Sudbrock, H.: Flexible scheduler-independent security. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 116–133. Springer, Heidelberg (2010)CrossRef
23.
Zurück zum Zitat Milner, R.: Communication and Concurrency, vol. 84. Prentice hall, Upper Saddle River (1989)MATH Milner, R.: Communication and Concurrency, vol. 84. Prentice hall, Upper Saddle River (1989)MATH
24.
Zurück zum Zitat Rafnsson, W., Sabelfeld, A.: Compositional information-flow security for interactive systems. In: CSF 2014, pp. 277–292 (2014) Rafnsson, W., Sabelfeld, A.: Compositional information-flow security for interactive systems. In: CSF 2014, pp. 277–292 (2014)
25.
Zurück zum Zitat Rushby, J.: Separation and integration in MILS (the MILS constitution). Computer Science Laboratory SRI International, Technical Report (2008) Rushby, J.: Separation and integration in MILS (the MILS constitution). Computer Science Laboratory SRI International, Technical Report (2008)
26.
Zurück zum Zitat Sabelfeld, A.: Confidentiality for multithreaded programs via bisimulation. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol. 2890, pp. 260–274. Springer, Heidelberg (2004)CrossRef Sabelfeld, A.: Confidentiality for multithreaded programs via bisimulation. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol. 2890, pp. 260–274. Springer, Heidelberg (2004)CrossRef
27.
Zurück zum Zitat Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef
28.
Zurück zum Zitat Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: CSFW 2000, pp. 200–214 (2000) Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: CSFW 2000, pp. 200–214 (2000)
29.
Zurück zum Zitat Smith, G.: Improved typings for probabilistic noninterference in a multi-threaded language. J. Comput. Secur. 14(6), 591–623 (2006) Smith, G.: Improved typings for probabilistic noninterference in a multi-threaded language. J. Comput. Secur. 14(6), 591–623 (2006)
30.
Zurück zum Zitat Smith, G., Volpano, D.M.: Secure information flow in a multi-threaded imperative language. In: POPL 1998, pp. 355–364 (1998) Smith, G., Volpano, D.M.: Secure information flow in a multi-threaded imperative language. In: POPL 1998, pp. 355–364 (1998)
31.
Zurück zum Zitat van der Meyden, R., Zhang, C.: Information flow in systems with schedulers, part I: definitions. Theor. Comput. Sci. 467, 68–88 (2013)CrossRefMathSciNetMATH van der Meyden, R., Zhang, C.: Information flow in systems with schedulers, part I: definitions. Theor. Comput. Sci. 467, 68–88 (2013)CrossRefMathSciNetMATH
32.
Zurück zum Zitat Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2/3), 167–188 (1996) Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2/3), 167–188 (1996)
Metadaten
Titel
Disjunctive Information Flow for Communicating Processes
verfasst von
Ximeng Li
Flemming Nielson
Hanne Riis Nielson
Xinyu Feng
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-28766-9_7