Skip to main content
Erschienen in:
Buchtitelbild

Open Access 2019 | OriginalPaper | Buchkapitel

Foundations for Parallel Information Flow Control Runtime Systems

verfasst von : Marco Vassena, Gary Soeller, Peter Amidon, Matthew Chan, John Renner, Deian Stefan

Erschienen in: Principles of Security and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present the foundations for a new dynamic information flow control (IFC) parallel runtime system, LIO\(_{\mathrm {PAR}}\). To our knowledge, LIO\(_{\mathrm {PAR}}\) is the first dynamic language-level IFC system to (1) support deterministic parallel thread execution and (2) eliminate both internal- and external-timing covert channels that exploit the runtime system. Most existing IFC systems are vulnerable to external timing attacks because they are built atop vanilla runtime systems that do not account for security—these runtime systems allocate and reclaim shared resources (e.g., CPU-time and memory) fairly between threads at different security levels. While such attacks have largely been ignored—or, at best, mitigated—we demonstrate that extending IFC systems with parallelism leads to the internalization of these attacks. Our IFC runtime system design addresses these concerns by hierarchically managing resources—both CPU-time and memory—and making resource allocation and reclamation explicit at the language-level. We prove that LIO\(_{\mathrm {PAR}}\) is secure, i.e., it satisfies progress- and timing-sensitive non-interference, even when exposing clock and heap-statistics APIs.
Hinweise
This work was supported in part by the CONIX Research Center, one of six centers in JUMP, a Semiconductor Research Corporation program sponsored by DARPA and by gifts from Cisco and Fujitsu. This work was partly done while Marco Vassena and Matthew Chan were at UCSD.

1 Introduction

Language-level dynamic information flow control (IFC) is a promising approach to building secure software systems. With IFC, developers specify application-specific, data-dependent security policies. The language-level IFC system—often implemented as a library or as part of a language runtime system—then enforces these policies automatically, by tracking and restricting the flow of information throughout the application. In doing so, IFC can ensure that different application components—even when buggy or malicious—cannot violate data confidentiality or integrity.
The key to making language-level IFC practical lies in designing real-world programming language features and abstractions without giving up on security. Unfortunately, many practical language features are at odds with security. For example, even exposing language features as simple as https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figa_HTML.gif -statements can expose users to timing attacks [42, 64]. Researchers have made significant strides towards addressing these challenges—many IFC systems now support real-world features and abstractions safely [10, 15, 20, 34, 43, 50, 51, 54, 55, 59, 60, 62, 67, 68]. To the best of our knowledge, though, no existing language-level dynamic IFC supports parallelism. Yet, many applications rely on parallel thread execution. For example, modern Web applications typically handle user requests in parallel, on multiple CPU cores, taking advantage of modern hardware. Web applications built atop state-of-the-art dynamic IFC Web frameworks (e.g., Jacqueline [67], Hails [12, 13], and LMonad [45]), unfortunately, do not handle user requests in parallel—the language-level IFC systems that underlie them (e.g., Jeeves [68] and LIO [54]) do not support parallel thread execution.
In this paper we show that extending most existing IFC systems—even concurrent IFC systems such as LIO—with parallelism is unsafe. The key insight is that most IFC systems do not prevent sensitive computations from affecting public computations; they simply prevent public computations from observing such sensitive effects. In the sequential and concurrent setting, such effects are only observable to attackers external to the program and thus outside the scope of most IFC systems. However, when computations execute in parallel, they are essentially external to one another and thus do not require an observer external to the system—they can observe such effects internally.
Consider a program consisting of three concurrent threads: two public threads—\(p_0\) and \(p_1\)—and a secret thread—\(s_0\). On a single core, language-level IFC can ensure that \(p_0\) and \(p_1\) do not learn anything secret by, for example, disallowing them from observing the return values (or lack thereof) of the secret thread. Systems such as LIO are careful to ensure that public threads cannot learn secrets even indirectly (e.g., via covert channels that abuse the runtime system scheduler). But, secret threads can leak information to an external observer that monitors public events (e.g., messages from public threads) by influencing the behavior of the public threads. For example, \(s_0\) can terminate (or not) based on a secret and thus affect the amount of time \(p_0\) and \(p_1\) spend executing on the CPU—if \(s_0\) terminated, the runtime allots the whole CPU to public threads, otherwise it only allots, say, two thirds of the CPU to the public threads; this allows an external attacker to trivially infer the secret (e.g., by measuring the rate of messages written to a public channel). Unfortunately, such external timing attacks manifest internally to the program when threads execute in parallel, on multiple cores. Suppose, for example, that \(p_0\) and \(s_0\) are co-located on a core and run in parallel to \(p_1\). By terminating early (or not) based on a secret, \(s_0\) affects the CPU time allotted to \(p_0\), which can be measured by \(p_1\). For example, \(p_1\) can count the number of messages sent from \(p_0\) on a public channel—the number of \(p_0\) writes indirectly leaks whether or not \(s_0\) terminated.
We demonstrate that such attacks are feasible by building several proof-of-concept programs that exploit the way the runtime system allocates and reclaims shared resources to violate LIO’s security guarantees. Then, we design a new dynamic parallel language-level IFC runtime system called LIO\(_{\mathrm {PAR}}\), which extends LIO to the parallel setting by changing how shared runtime system resources—namely CPU-time and memory—are managed. Ordinary runtime systems (e.g., GHC for LIO) fairly balance resources between threads; this means that allocations or reclamations for secret LIO threads directly affect resources available for public LIO threads. In contrast, LIO\(_{\mathrm {PAR}}\) makes resource management explicit and hierarchical. When allocating new resources on behalf of a thread, the LIO\(_{\mathrm {PAR}}\) runtime does not “fairly” steal resources from all threads. Instead, LIO\(_{\mathrm {PAR}}\) demands that the thread requesting the allocation explicitly gives up a portion of its own resources. Similarly, the runtime does not automatically relinquish the resources of a terminated thread—it requires the parent thread to explicitly reclaim them.
Nevertheless, automatic memory management is an integral component of modern language runtimes—high-level languages (e.g., Haskell and thus LIO) are typically garbage collected, relieving developers from manually reclaiming unused memory. Unfortunately, even if memory is hierarchically partitioned, some garbage collection (GC) algorithms, such as GHC’s stop-the-world GC, may introduce timing covert channels [46]. Inspired by previous work on real-time GCs (e.g., [3, 5, 6, 16, 44, 48]), we equip LIO\(_{\mathrm {PAR}}\) with a per-thread, interruptible garbage collector. This strategy is agnostic to the particular GC algorithm used: our hierarchical runtime system only demands that the GC runs within the memory confines of individual threads and their time budget.
In sum, this paper makes three contributions:
\(\blacktriangleright \)
We observe that several external timing attacks manifest internally in the presence of parallelism and demonstrate that LIO, when compiled to run on multiple cores, is vulnerable to such attacks (Sect. 2).
\(\blacktriangleright \)
In response to these attacks, we propose a novel parallel runtime system design that safely manages shared resources by enforcing explicit and hierarchical resource allocation and reclamation (Sect. 3). To our knowledge, LIO\(_{\mathrm {PAR}}\) is the first parallel language-level dynamic IFC runtime system to address both internal and external timing attacks that abuse the runtime system scheduler, memory allocator, and GC.
\(\blacktriangleright \)
We formalize the LIO\(_{\mathrm {PAR}}\) hierarchical runtime system (Sect. 4) and prove that it satisfies progress- and timing-sensitive non-interference (Sect. 5); we believe that this is the first general purpose dynamic IFC runtime system to provide such strong guarantees in the parallel setting [64].
Neither our attack nor our defense is tied to LIO or GHC—we focus on LIO because it already supports concurrency. We believe that extending any existing language-level IFC system with parallelism will pose the same set of challenges—challenges that can be addressed using explicit and hierarchical resource management.

2 Internal Manifestation of External Attacks

In this section we give a brief overview of LIO and discuss the implications of shared, finite runtime system resources on security. We demonstrate several external timing attacks against LIO that abuse two such resources—the thread scheduler and garbage collector—and show how running LIO threads in parallel internalizes these attacks.

2.1 Overview of the Concurrent LIO Information Flow Control System

At a high level, the goal of an IFC system is to track and restrict the flow of information according to a security policy—almost always a form of non-interference [14]. Informally, this policy ensures confidentiality, i.e., secret data should not leak to public entities, and integrity, i.e., untrusted data should not affect trusted entities.
To this end, LIO tracks the flow of information at a coarse-granularity, by associating labels with threads. Implicitly, the thread label classifies all the values in its scope and reflects the sensitivity of the data that it has inspected. Indeed, LIO “raises” the label of a thread to accommodate for reading yet more sensitive data. For example, when a public thread reads secret data, its label is raised to secret—this reflects the fact that the rest of the thread computation may depend on sensitive data. Accordingly, LIO uses the thread’s current label or program counter label to restrict its communication. For example, a secret thread can only communicate with other secret threads.
In LIO, developers can express programs that manipulate data of varying sensitivity—for example programs that handle both public and secret data—by forking multiple threads, at run-time, as necessary. However, naively implementing concurrency in an IFC setting is dangerous: concurrency can amplify and internalize the termination covert channel [1, 58], for example, by allowing public threads to observe whether or not secret threads terminated. Moreover, concurrency often introduces internal timing covert channels wherein secret threads leak information by influencing the scheduling behavior of public threads. Both classes of covert channels are high-bandwidth and easy to exploit.
Stefan et al. [54] were careful to ensure that LIO does not expose these termination and timing covert channels internally. LIO ensures that even if secret threads terminate early, loop forever, or otherwise influence the runtime system scheduler, they cannot leak information to public threads. But, secret threads do affect public threads with those actions and thus expose timing covert channels externally—public threads just cannot detect it. In particular, LIO disallows public threads from (1) directly inspecting the return values (and thus timing and termination behavior) of secret threads, without first raising their program counter label, and (2) observing runtime system resource usage (e.g., elapsed time or memory availability) that would indirectly leak secrets.
LIO prevents public threads from measuring CPU-time usage directly—LIO does not expose a clock API—and indirectly—threads are scheduled fairly in a round-robin fashion [54]. Similarly, LIO prevents threads from measuring memory usage directly—LIO does not expose APIs for querying heap statistics—and indirectly, through garbage collection cycles (e.g., induced by secret threads) [46]—GHC’s stop-the-world GC stops all threads. Like other IFC systems, the security guarantees of LIO are weaker in practice because its formal model does not account for the GC and assumes memory to be infinite [54, 55].

2.2 External Timing Attacks to Runtime Systems

Since secret threads can still influence public threads by abusing the scheduler and GC, LIO is vulnerable to external timing and termination attacks, i.e., attacks that leak information to external observers. To illustrate this, we craft several LIO programs consisting of two threads: a public thread p that writes to the external channel observed by the attacker and a secret thread s, which abuses the runtime to influence the throughput of the public thread. The secret thread can leak in many ways, for example, thread s can:
1.
fork bomb, i.e., fork thousands of secret threads that will be interleaved with p and thus decrease its write throughput;
 
2.
terminate early to relinquish the CPU to p and thus double its write throughput;
 
3.
exhaust all memory to crash the program, and thus stop p from further writing to the channel;
 
4.
force a garbage collection which, because of GHC’s stop-the-world GC, will intermittently stop p from writing to the channel.
 
These attacks abuse the runtime’s automatic allocation and reclamation of shared resources, i.e., CPU time and memory. In particular, attack 1 hinges on the runtime allocating CPU time for the new secret threads, thus reducing the CPU time allotted to the public thread. Dually, attack 2 relies on it reclaiming the CPU time of terminated threads—it reassigns it to public threads. Similarly, attacks 3 and 4 force the runtime to allocate all the available memory and preemptively reassign CPU time to the GC, respectively.
These attacks are not surprising, but, with the exception of the GC-based attack [46], they are novel in the IFC context. Moreover these attacks are not exhaustive—there are other ways to exploit the runtime system—nor optimized—our implementation leaks sensitive data at a rate of roughly 2bits/second1. Nevertheless, they are feasible and—because they abuse the runtime—they are effective against language-level external-timing mitigation techniques, including [54, 71]. The attacks are also feasible on other systems—similar attacks that abuse the GC have been demonstrated for both the V8 and JVM runtimes [46].

2.3 Internalizing External Timing Attacks

LIO, like almost all IFC systems, considers external timing out of scope for its attacker model. Unfortunately, when we run LIO threads on multiple cores, in parallel, the allocation and reclamation of resources on behalf of secret threads is indirectly observable by public threads. Unsurprisingly, some of the above external timing attacks manifest internally—a thread running on a parallel core acts as an “external” attacker. To demonstrate the feasibility of such attacks, we describe two variants of the aforementioned scheduler-based attacks which leak sensitive information internally to public threads.
Secret threads can leak information by relinquishing CPU time, which the runtime reclaims and unsafely redistributes to public threads running on the same core. Our attack program consists of three threads: two public threads—\(p_0\) and \(p_1\)—and a secret thread—\(s_0\). Figure 1 shows the pseudo-code for this attack. Note that the threads are secure in isolation, but leak the value of secret when executed in parallel, with a round robin scheduler. In particular, threads \(p_0\) and \(s_0\) run concurrently on core \(c_0\) using half of the CPU time each, while \(p_1\) runs in parallel alone on core \(c_1\) using all the CPU time. Both public threads repeatedly write their respective thread IDs to a public channel. The secret thread, on the other hand, loops forever or terminates depending on secret. Intuitively, when the secret thread terminates, the runtime system redirects its CPU time to \(p_0\), causing both \(p_1\) and \(p_0\) to write at the same rate. In converse, when the secret thread does not terminate early, \(p_0\) is scheduled in a round-robin fashion with \(s_0\) on the same core and can thus only write half as fast as \(p_1\). More specifically:
\(\blacktriangleright \)
If secret = true, thread \(s_0\) terminates and the runtime system assigns all the CPU time of core \(c_0\) to public thread \(p_0\), which then writes at the same rate as thread \(p_1\) on core \(c_1\). Then, \(p_0\) writes as many times as \(p_1\), which then returns true.
\(\blacktriangleright \)
If secret = false, secret thread \(s_0\) loops and public thread \(p_0\) shares the CPU time on core \(c_0\) with it. Then, \(p_0\) writes messages at roughly half the rate of thread \(p_1\), which writes more often—it has all the CPU time on \(c_1\)—and thus returns false.2
Secret LIO threads can also leak information by allocating many secret threads on a core with public threads—this reduces the CPU-time available to the public threads. For example, using the same setting with three threads from before, the secret thread forks a spinning thread on core \(c_1\) by replacing command terminate with command fork (forever skip) \(c_1\) in the code of thread \(s_0\) in Fig. 1. Intuitively, if secret is false, then \(p_1\) writes more often than \(p_0\) before, otherwise the write rate of \(p_1\) decreases—it shares core \(c_1\) with the child thread of \(s_0\)—and \(p_0\) writes as often as \(p_1\).
Not all external timing attacks can be internalized, however. In particular, GHC’s approach to reclaiming memory via a stop-the-world GC simultaneously stops all threads on all cores, thus the relative write rate of public threads remain constant. Interestingly, though, implementing LIO on runtimes (e.g., Node.js as proposed by Heule et al. [17]) with modern parallel garbage collectors that do not always stop the world would internalize the GC-based external timing attacks. Similarly, abusing GHC’s memory allocation to exhaust all memory crashes all the program threads and, even though it cannot be internalized, it still results in information leakage.

3 Secure, Parallel Runtime System

To address the external and internal timing attacks, we propose a new dynamic IFC runtime system design. Fundamentally, today’s runtime systems are vulnerable because they automatically allocate and reclaim resources that are shared across threads of varying sensitivity. However, the automatic allocation and reclamation is not in itself a problem—it is only a problem because the runtime steals (and grants) resources from (and to) differently-labeled threads.
Our runtime system, LIO\(_{\mathrm {PAR}}\), explicitly partitions CPU-time and memory among threads—each thread has a fixed CPU-time and memory budget or quota. This allows resource management decisions to be made locally, for each thread, independent of the other threads in the system. For example, the runtime scheduler of LIO\(_{\mathrm {PAR}}\) relies on CPU-time partitioning to ensure that threads always run for a fixed amount of time, irrespective of the other threads running on the same core. Similarly, in LIO\(_{\mathrm {PAR}}\), the memory allocator and garbage collector rely on memory partitioning to be able to allocate and collect memory on behalf of a thread without being influenced or otherwise influencing other threads in the system. Furthermore, partitioning resources among threads enables fine-grained control of resources: LIO\(_{\mathrm {PAR}}\) exposes secure primitives to (i) measure resource usage (e.g., time and memory) and (ii) elicit garbage collection cycles.
The LIO\(_{\mathrm {PAR}}\) runtime does not automatically balance resources between threads. Instead, LIO\(_{\mathrm {PAR}}\) makes resource management explicit at the language level. When forking a new thread, for example, LIO\(_{\mathrm {PAR}}\) demands that the parent thread give up part of its CPU-time and memory budgets to the children. Indeed, LIO\(_{\mathrm {PAR}}\) even manages core ownership or capabilities that allow threads to fork threads across cores. This approach ensures that allocating new threads does not indirectly leak any information externally or to other threads. Dually, the LIO\(_{\mathrm {PAR}}\) runtime does not re-purpose unused memory or CPU-time, even when a thread terminates or “dies” abruptly—parent threads must explicitly kill their children when they wish to reclaim their resources.
To ensure that CPU-time and memory can always be reclaimed, LIO\(_{\mathrm {PAR}}\) allows threads to kill their children at any time. Unsurprisingly, this feature requires restricting the LIO\(_{\mathrm {PAR}}\) floating-label approach more than that of LIO—LIO\(_{\mathrm {PAR}}\) threads cannot raise their current label if they have already forked other threads. As a result, in LIO\(_{\mathrm {PAR}}\) threads form a hierarchy—children threads are always at least as sensitive as their parent—and thus it is secure to expose an API to allocate and reclaim resources.
Attacks Revisited. LIO\(_{\mathrm {PAR}}\) enforces security against reclamation-based attacks because secret threads cannot automatically relinquish their resources. For example, our hierarchical runtime system stops the attack in Fig. 1: even if secret thread \(s_0\) terminates (secret = true), the throughput of public thread \(p_0\) remains constant—LIO\(_{\mathrm {PAR}}\) does not reassign the CPU time of \(s_0\) to \(p_0\), but keeps \(s_0\) spinning until it gets killed. Similarly, LIO\(_{\mathrm {PAR}}\) protects against allocation-based attacks because secret threads cannot steal resources owned by other public threads. For example, the fork-bomb variant of the previous attack fails because LIO\(_{\mathrm {PAR}}\) aborts command fork (forever skip) \(c_1\)—thread \(s_0\) does not own the core capability \(c_1\)—and thus the throughput of \(p_1\) remains the same. In order to substantiate these claims, we first formalize the design of the hierarchical runtime system (Sect. 4) and establish its security guarantees (Sect. 5).
Trust Model. This work addresses attacks that exploit runtime system resource management—in particular memory and CPU-time. We do not address attacks that exploit other shared runtime system state (e.g., event loops [63], lazy evaluation [7, 59]), shared operating system state (e.g., file system locks [24], events and I/O [22, 32]), or shared hardware (e.g., caches, buses, pipelines and hardware threads [11, 47]) Though these are valid concerns, they are orthogonal and outside the scope of this paper.

4 Hierarchical Calculus

In this section we present the formal semantics of LIO\(_{\mathrm {PAR}}\). We model LIO\(_{\mathrm {PAR}}\) as a security monitor that executes simply typed \(\lambda \)-calculus terms extended with \( LIO \) security primitives on an abstract machine in the style of Sestoft [53]. The security monitor reduces secure programs and aborts the execution of leaky programs.
Semantics. The state of the monitor, written \((\varDelta , pc ,{N}\;|\; t , S )\), stores the state of a thread under execution and consists of a heap \(\varDelta \) that maps variables to terms, the thread’s program counter label \( pc \), the set \({N}\) containing the identifiers of the thread’s children, the term currently under reduction \( t \) and a stack of continuations \( S \). Figure 2 shows the interesting rules of the sequential small-step operational semantics of the security monitor. The notation https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq117_HTML.gif denotes a transition of the machine in state \( s\) that reduces to state \( s' \) in one step with thread parameters \(\mu \mathrel {=}(h, cl )\).3 Since we are interested in modeling a system with finite resources, we parameterize the transition with the maximum heap size \(h\;\in \;\mathbb {N}\). Additionally, the clearance label \( cl \) represents an upper bound over the sensitivity of the thread’s floating counter label \( pc \). Rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figc_HTML.gif begins a function application. Since our calculus is call-by-name, the function argument is saved as a thunk (i.e., an unevaluated expression) on the heap at fresh location \( x \) and the indirection is pushed on the stack for future lookups.4 Note that the rule allocates memory on the heap, thus the premise \({\vert }\varDelta {\vert }\;<\;h\) forbids a heap overflow, where the notation \({\vert }\varDelta {\vert }\) denotes the size of the heap \(\varDelta \), i.e., the number of bindings that it contains.5 To avoid overflows, a thread can measure the size of its own heap via primitive \( size \) (Sect. 4.2). If \( t _{1}\) evaluates to a function, e.g., \(\lambda y . t \), rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figd_HTML.gif starts evaluating the body, in which the bound variable \( y \) is substituted with the heap-allocated argument \( x \), i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq136_HTML.gif . When the evaluation of the function body requires the value of the argument, variable \( x \) is looked up in the heap (rule [Var]). In the next paragraph we present the rules of the basic security primitives. The other sequential rules are available in the extended version of this paper.
Security Primitives. A labeled value \( Labeled \;\ell \; t ^{\circ }\) of type \( Labeled \;\tau \) consists of term \( t \) of type \(\tau \) and a label \(\ell \), which reflects the sensitivity of the content. The annotation \( t ^{\circ }\) denotes that term \( t \) is closed and does not contain any free variable, i.e., \(fv( t )\mathrel {=}\varnothing \). We restrict the syntax of labeled values with closed terms for security reasons. Intuitively, LIO\(_{\mathrm {PAR}}\) allocates free variables inside a secret labeled values on the heap, which then leaks information to public threads with its size. For example, a public thread could distinguish between two secret values, e.g., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq147_HTML.gif with heap https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq148_HTML.gif , and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq149_HTML.gif with heap \(\varDelta \mathrel {=}\varnothing \), by measuring the size of the heap. To avoid that, labeled values are closed and the size of the heap of a thread at a certain security level, is not affected by data labeled at different security levels. A term of type \( LIO \;\tau \) is a secure computation that performs side effects and returns a result of type \(\tau \). Secure computations are structured using standard monadic constructs \( return \; t \), which embeds term \( t \) in the monad, and bind, written https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq155_HTML.gif , which sequentially composes two monadic actions, the second of which takes the result of the first as an argument. Rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Fige_HTML.gif deconstructs a computation https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq156_HTML.gif into term \( t _{1}\) to be reduced first and pushes on the stack the continuation https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq158_HTML.gif to be invoked after term \( t _{1}\).6 Then, the second rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figf_HTML.gif pops the topmost continuation placed on the stack (i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq160_HTML.gif ) and evaluates it with the result of the first computation (i.e., \( t _{2}\; t _{1}\)), which is considered complete when it evaluates to a monadic value, i.e., to syntactic form \( return \; t _{1}\). The runtime monitor secures the interaction between computations and labeled values. In particular, secure computations can construct and inspect labeled values exclusively with monadic primitives \( label \) and \( unlabel \) respectively. Rules https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figg_HTML.gif and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figh_HTML.gif are straightforward and follow the pattern seen in the other rules. Rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figi_HTML.gif generates a labeled value at security level \(\ell \), subject to the constraint \( pc \;\sqsubseteq \;\ell \;\sqsubseteq \; cl \), which prevents a computation from labeling values below the program counter label \( pc \) or above the clearance label \( cl \).7 The rule computes the closure of the content, i.e., closed term \( t ^{\circ }\), by recursively substituting every free variable in term \( t \) with its value in the heap, written \(\varDelta ^{*}( t )\). Rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figj_HTML.gif extracts the content of a labeled value and taints the program counter label with its label, i.e., it rises it to \( pc \;\sqcup \;\ell \), to reflect the sensitivity of the data that is now in scope. The premise \( pc \;\sqcup \;\ell \;\sqsubseteq \; cl \) ensures that the program counter label does not float over the clearance \( cl \). Thus, the run-time monitor prevents the program counter label from floating above the clearance label (i.e., \( pc \;\sqsubseteq \; cl \) always holds).
The calculus also includes concurrent primitives to allocate resources when forking threads (\( fork \) and \( spawn \) in Sect. 4.1), reclaim resources and measure resource usage (\( kill \), \( size \), and \( time \) in Sect. 4.2), threads synchronization and communication (\( wait \), \( send \) and \( receive \) in the extended version of this paper).

4.1 Core Scheduler

In this section, we extend LIO\(_{\mathrm {PAR}}\) with concurrency, which enables (i) interleaved execution of threads on a single core and (ii) simultaneous execution on \(\kappa \) cores. To protect against attacks that exploit the automatic management of shared finite resource (e.g., those in Sect. 2.3), LIO\(_{\mathrm {PAR}}\) maintains a resource budget for each running thread and updates it as threads allocate and reclaim resources. Since \(\kappa \) threads execute at the same time, those changes must be coordinated in order to preserve the consistency of the resource budgets and guarantee deterministic parallelism. For this reason, the hierarchical runtime system is split in two components: (i) the core scheduler, which executes threads on a single core, ensures that they respect their resource budgets and performs security checks, and (ii) the top-level parallel scheduler, which synchronizes the execution on multiple cores and reassigns resources by updating the resource budgets according to the instructions of the core schedulers. We now introduce the core scheduler and describe the top-level parallel scheduler in Sect. 4.3.
Syntax. Figure 3 presents the core scheduler, which has access to the global state \(\varSigma \mathrel {=}({T},{B}, H ,\theta ,\omega )\), consisting of a thread pool map \({T}\), which maps a thread id to the corresponding thread’s current state, the time budget map \({B}\), a memory budget map \( H \), core capabilities map \(\theta \), and the global clock \(\omega \). Using these maps, the core scheduler ensures that thread \( n \): (i) performs \({B}( n )\) uninterrupted steps until the next thread takes over, (ii) does not grow its heap above its maximum heap size \( H ( n )\), and (iii) has exclusive access to the free core capabilities \(\theta ( n )\). Furthermore, each thread id \( n \) records the initial current label when the thread was created (\( n . pc \)), its clearance (\( n . cl \)), and the core where it runs (\( n . k \)), so that the runtime system can enforce security. Notice that thread ids are opaque to threads—they cannot forge them nor access their fields.
Hierarchical Scheduling. The core scheduler performs deterministic and hierarchical scheduling—threads lower in the hierarchy are scheduled first, i.e., parent threads are scheduled before their children. The scheduler manages a core run queue \( Q \), which is structured as a binary tree with leaves storing thread ids and residual time budgets. The notation \( n ^ b \) indicates that thread \( n \) can run for \( b \) more steps before the next thread runs. When a new thread is spawned, the scheduler creates a subtree with the parent thread on the left and the child on the right. The scheduler can therefore find the thread with the highest priority by following the left spine of the tree and backtracking to the right if a thread has no residual budget.8 We write \( Q {[}\langle n ^ b \rangle {]}\) to mean the first thread encountered via this traversal is \( n \) with budget \( b \). As a result, given the slice \( Q {[}\langle n ^{\mathrm {1}\mathbin {+} b }\rangle {]}\), thread \( n \) is the next thread to run, and \( Q {[}\langle n ^{\mathrm {0}}\rangle {]}\) occurs only if all threads in the queue have zero residual budget. We overload this notation to represent tree updates: a rule \( Q {[}\langle n ^{\mathrm {1}\mathbin {+} b }\rangle {]}\rightarrow Q {[}\langle n ^{ b }\rangle {]}\) finds the next thread to run in queue \( Q \) and decreases its budget by one.
Semantics. Figure 3 formally defines the transition \( Q \;\xrightarrow {( n , s, e )}_{\varSigma }\; Q' \), which represents an execution step of the core scheduler that schedules thread \( n \) in core queue \( Q \), executes it with global state \(\varSigma \mathrel {=}({T},{B}, H ,\theta ,\omega )\) and updates the queue to \( Q' \). Additionally, the core scheduler informs the parallel scheduler of the final state \( s\) of the thread and requests on its behalf to update the global state by means of event message \( e \). In rule [Step], the scheduler retrieves the next thread in the schedule, i.e., \( Q {[}\langle n ^{\mathrm {1}\mathbin {+} b }\rangle {]}\) and its state in the thread pool from the global state, i.e., \(\varSigma .{T}( n )\mathrel {=} s\). Then, it executes the thread for one sequential step with its memory budget and clearance, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq226_HTML.gif with \(\mu \mathrel {=}( \varSigma .H ( n ), n . cl )\), sends the empty event \(\epsilon \) to the parallel scheduler, and decrements the thread’s residual budget in the final queue, i.e., \( Q {[}\langle n ^{ b }\rangle {]}\). In rule [Fork], thread \( n \) creates a new thread \( t \) with initial label https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq232_HTML.gif and clearance https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq233_HTML.gif , such that https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq234_HTML.gif and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq235_HTML.gif . The child thread runs on the same core of the parent thread, i.e., \( n . k \), with fresh id \( n' \), which is then added to the set of children, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq238_HTML.gif . Since parent and child threads do not share memory, the core scheduler must copy the portion of the parent’s private heap reachable by the child’s thread, i.e., \(\varDelta '\); we do this by copying the bindings of the variables that are transitively reachable from \( t \), i.e., \(fv^{*}( t , \varDelta )\), from the parent’s heap \(\varDelta \). The parent thread gives \(h_{2}\) of its memory budget \( \varSigma .H ( n )\) to its child. The conditions \({\vert }\varDelta {\vert }\leqslant h_{1}\) and \({\vert }\varDelta '{\vert }\leqslant h_{2}\), ensure that the heaps do not overflow their new budgets. Similarly, the core scheduler splits the residual time budget of the parent into \( b _{1}\) and \( b _{2}\) and informs the parallel scheduler about the new thread and its resources with event \(\mathbf {fork}(\varDelta ', n' , t , b _{2},h_{2})\), and lastly updates the tree \( Q \) by replacing the leaf \(\langle n ^{\mathrm {1}\mathbin {+} b _{1}\mathbin {+} b _{2}}\rangle \) with the two-leaves tree https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq252_HTML.gif , so that the child thread will be scheduled immediately after the parent has consumed its remaining budget \( b _{1}\), as explained above. Rule [Spawn] is similar to [Fork], but consumes core capability resources instead of time and memory. In this case, the core scheduler checks that the parent thread owns the core where the child is scheduled and the core capabilities assigned to the child, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq254_HTML.gif for some set \(K_2\), and informs the parallel scheduler with event \(\mathbf {spawn}(\varDelta ', n' , t ,K_1)\). Rule [Stuck] performs busy waiting by consuming the time budget of the scheduled thread, when it is stuck and cannot make any progress—the premises of the rule enumerate the conditions under which this can occur (see the extended version of this paper for details). Lastly, in rule [ContextSwitch] all the threads scheduled in the core queue have consumed their time budget, i.e., \( Q {[}\langle n ^{\mathrm {0}}\rangle {]}\) and the core scheduler resets their residual budget using the budget map \(\varSigma .{B}\). In the rule, the notation \( Q {[}\langle n _{i}^{ b }\rangle {]}\) selects the \(i\)-th leaf, where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq261_HTML.gif and \({\vert } Q {\vert }\) denotes the number of leaves of tree \( Q \) and symbol \(\circ \) denotes the thread identifier of the core scheduler, which updates a dummy thread that simply spins during a context-switch or whenever the core is unused.

4.2 Resource Reclamation and Observations

The calculus presented so far enables threads to manage their time, memory and core capabilities hierarchically, but does not provide any primitive to reclaim their resources. This section rectifies this by introducing (i) a primitive to kill a thread and return its resources back to the owner and (ii) a primitive to elicit a garbage collection cycle and reclaim unused memory. Furthermore, we demonstrate that the runtime system presented in this paper is robust against timing attacks by exposing a timer API allowing threads to access a global clock.9 Intuitively, it is secure to expose this feature because LIO\(_{\mathrm {PAR}}\) ensures that the time spent executing high threads is fixed in advanced, so timing measurements of low threads remain unaffected. Lastly, since memory is hierarchically partitioned, each thread can securely query the current size of its private heap, enabling fine-grained control over the garbage collector.
Kill. A parent thread can reclaim the resources given to its child thread \( n' \), by executing \( kill \; n' \). If the child thread has itself forked or spawned other threads, they are transitively killed and their resources returned to the parent thread. The concurrent rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figk_HTML.gif in Fig. 4 initiates this process, which is completed by the parallel scheduler via event \(\mathbf {kill}( n' )\). Note that the rule applies only when the thread killed is a direct child of the parent thread—that is when the parent’s children set has shape https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq270_HTML.gif for some set \({N}\). Now that threads can unrestrictedly reclaim resources by killing their children, we must revise the primitive \( unlabel \), since the naive combination of \( kill \) and \( unlabel \) can result in information leakage. This will happen if a public thread forks another public thread, then reads a secret value (raising its label to secret), and based on that decides to kill the child. To close the leak, we modify the rule https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/MediaObjects/480689_1_En_1_Figl_HTML.gif by adding the highlighted premise, causing the primitive \( unlabel \) to fail whenever the parent thread’s label would float above the initial current label of one of its children.
Garbage Collection. Rule [GC] extends LIO\(_{\mathrm {PAR}}\) with a time-sensitive hierarchical garbage collector via the primitive \( gc \; t \). The rule elicits a garbage collection cycle which drops entries that are no longer needed from the heap, and then evaluates \( t \). The sub-heap \(\varDelta '\) includes the portion of the current heap that is (transitively) reachable from the free variables in scope (i.e. those present in the term, \(fv^{*}( t , \varDelta )\) or on the stack \(fv^{*}( S , \varDelta )\)). After collection, the thread resumes and evaluates term \( t \) under compacted private heap \(\varDelta '\).10 In rule [App-GC], a collection is automatically triggered when the thread’s next memory allocation would overflow the heap.
Resource Observations. All threads in the system share a global fine-grained clock \(\omega \), which is incremented by the parallel scheduler at each cycle (see below). Rule [Time] gives all threads unrestricted access to the clock via monadic primitive \( time \).

4.3 Parallel Scheduler

This section extends LIO\(_{\mathrm {PAR}}\) with deterministic parallelism, which allows to execute \(\kappa \) threads simultaneously on as many cores. To this end, we introduce the top-level parallel scheduler, which coordinates simultaneous changes to the global state by updating the resource budgets of the threads in response core events (e.g., fork, spawn, and kill) and ticks the global clock.
Semantics. Figure 5 formalizes the operational semantics of the parallel scheduler, which reduces a configuration \( c \mathrel {=}\langle \varSigma ,\varPhi \rangle \) consisting of global state \(\varSigma \) and core map \(\varPhi \) mapping each core to its run queue, to configuration \( c' \) in one step, written \( c \hookrightarrow c' \), through rule [Parallel] only. The rule executes the threads scheduled on each of the \(\kappa \) cores, which all step at once according to the concurrent semantics presented in Sects. 4.14.2, with the same current global state \(\varSigma \). Since the execution of each thread can change \(\varSigma \) concurrently, the top-level parallel scheduler reconciles those actions by updating \(\varSigma \) sequentially and deterministically.11 First, the scheduler updates the thread pool map \({T}\) and core map \(\varPhi \) with the final state obtained by running each thread in isolation, i.e., \( T' \mathrel {=}\varSigma .{T} [ n _{i} \mapsto s_{i} ]\) and \(\varPhi '\mathrel {=}\varPhi [ i \mapsto Q _{i} ]\) for https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq301_HTML.gif . Then, it collects all concurrent events generated by the \(\kappa \) threads together with their thread id, sorts the events according to type, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq303_HTML.gif , and computes the updated configuration by processing the events in sequence.12 In particular, new threads are created first (event \(\mathbf {spawn}(\cdot )\) and \(\mathbf {fork}(\cdot )\)), and then killed (event \(\mathbf {kill}(\cdot )\))—the ordering between events of the same type is arbitrary and assumed to be fixed. Trivial events (\(\epsilon \)) do not affect the configuration and thus their ordering is irrelevant. The function https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq310_HTML.gif computes a final configuration by processing a list of events in order, accumulating configuration updates (\(next(\cdot )\) updates the current configuration by one event-step): https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq312_HTML.gif . When no more events need processing, the configuration is returned https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq313_HTML.gif .
Event Processing. Figure 5 defines function \(next( n , e , c )\), which takes a thread identifier \( n \), the event \( e \) that thread \( n \) generated, the current configuration and outputs the configuration obtained by performing the thread’s action. The empty event \(\epsilon \) is trivial and leaves the state unchanged. Event \(( n _{1},\mathbf {fork}(\varDelta , n _{2}, t , b ,h))\) indicates that thread \( n _{1}\) forks thread \( t \) with identifier \( n _{2}\), sub-heap \(\varDelta \), time budget \( b \) and maximum heap size \(h\). The scheduler deducts these resources from the parent’s budgets, i.e., \( B' \mathrel {=}{B} [ n _{1} \mapsto {B}( n _{1})\mathbin {-} b ]\) and \( H' \mathrel {=} H [ n _{1} \mapsto H ( n _{1})\mathbin {-}h ]\) and assigns them to the child, i.e., \( B' [ n _{2} \mapsto b ]\) and \( H' [ n _{2} \mapsto h ]\).13 The new child shares the core with the parent—it has no core capabilities i.e., \(\theta '\mathrel {=}\theta [ n _{2} \mapsto \varnothing ]\)—and so the core map is left unchanged. Lastly, the scheduler adds the child to the thread pool and initializes its state, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq332_HTML.gif . The scheduler handles event \(( n _{1},\mathbf {spawn}(\varDelta , n _{2}, t , K ))\) similarly. The new thread \( t \) gets scheduled on core \( n _{2}. k \), i.e., \(\varPhi [ n _{2}. k \mapsto \langle n _{2}^{{B}_{\mathrm {0}}}\rangle ]\), where the thread takes all the time and memory resources of the core, i.e., \({B} [ n _{2} \mapsto {B}_{\mathrm {0}} ]\) and \( H [ n _{2} \mapsto H _{\mathrm {0}} ]\), and extra core capabilities \( K \), i.e., \(\theta ' [ n _{2} \mapsto K ]\). For simplicity, we assume that all cores execute \({B}_{\mathrm {0}}\) steps per-cycle and feature a memory of size \( H _{\mathrm {0}}\). Event \(( n ,\mathbf {kill}( n' ))\) informs the scheduler that thread \( n \) wishes to kill thread \( n' \). The scheduler leaves the global state unchanged if the parent thread has already been killed by the time this event is handled, i.e., when the guard \( n \;\not \in \; Dom ({T})\) is true—the resources of the child \( n' \) will have been reclaimed by another ancestor. Otherwise, the scheduler collects the identifiers of the descendants of \( n' \) that are alive ( https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq349_HTML.gif )—they must be killed (and reclaimed) transitively. The set \({N}\) is computed recursively by \(\llbracket {N}\rrbracket ^{{T}}\), using the thread pool \({T}\), i.e., \(\llbracket \varnothing \rrbracket ^{{T}}\mathrel {=}\varnothing \), https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq354_HTML.gif and \(\llbracket {N}_{1}\,\cup \,{N}_{2}\rrbracket ^{{T}}\mathrel {=}\llbracket {N}_{1}\rrbracket ^{{T}}\,\cup \,\llbracket {N}_{2}\rrbracket ^{{T}}\). The scheduler then increases the time and memory budget of the parent with the sum of the budget of all its descendants scheduled on the same core, i.e., \(\sum _{i\;\in \;{N},i. k \mathrel {=} n . k }{{B}(i)}\) (resp. \(\sum _{i\;\in \;{N},i. k \mathrel {=} n . k }{ H (i)})\)—descendants running on other cores do not share those resources. The scheduler reassigns to the parent thread their core capabilities, which are split between capabilities explicitly assigned but not in use, i.e., \(\bigcup _{i\;\in \;{N}}\theta (i)\) and core capabilities assigned and in use by running threads, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq359_HTML.gif . Lastly, the scheduler removes the killed threads from each core, written \(\varPhi (i) \setminus {N}\), by pruning the leaves containing killed threads and reassigning their leftover time budget to their parent, see the extended version of this paper for details.

5 Security Guarantees

In this section we show that LIO\(_{\mathrm {PAR}}\) satisfies a strong security condition that ensures timing-agreement of threads and rules out timing covert channels. In Sect. 5.1, we describe our proof technique based on term erasure, which has been used to verify security guarantees of functional programming languages [30], IFC libraries [8, 17, 54, 56, 61], and an IFC runtime system [59]. In Sect. 5.2, we formally prove security, i.e., progress- and timing-sensitive non-interference, a strong form of non-interference [14], inspired by Volpano and Smith [64]—to our knowledge, it is considered here for the first time in the context of parallel runtime systems. Works that do not address external timing channels [59, 62] normally prove progress-sensitive non-interference, wherein the number of execution steps of a program may differ in two runs based on a secret. This condition is insufficient in the parallel setting: both public and secret threads may step simultaneously on different cores and any difference in the number of execution steps would introduce external and internal timing attacks. Similar to previous works on secure multi-threaded systems [36, 52], we establish a strong low-bisimulation property of the parallel scheduler, which guarantees that attacker-indistinguishable configurations execute in lock-step and remain indistinguishable. Theorem 1 and Corollary 1 use this property to ensure that any two related parallel programs execute in exactly the same number of steps.

5.1 Erasure Function

The term erasure technique relies on an erasure function, written https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq362_HTML.gif , which rewrites secret data above the attacker’s level https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq363_HTML.gif to special term \(\bullet \), in all the syntactic categories: values, terms, heaps, stacks, global states and configurations.14 Once the erasure function is defined, the core of the proof technique consists of proving an essential commutativity relationship between the erasure function and reduction steps: given a step \( c \hookrightarrow c' \), there must exist a reduction that simulates the original reduction between the erased configurations, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq368_HTML.gif . Intuitively, if the configuration \( c \) leaked secret data while stepping to \( c' \), that data would be classified as public in \( c' \) and thus would remain in https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq372_HTML.gif — but such secret data would be erased by https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq373_HTML.gif and the property would not hold. The erasure function leaves ground values, e.g., \(()\), unchanged and on most terms it acts homomorphically, e.g., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq375_HTML.gif . The interesting cases are for labeled values, thread configurations, and resource maps. The erasure function removes the content of secret labeled values, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq376_HTML.gif , and erases the content recursively otherwise, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq377_HTML.gif . The state of a thread is erased per-component, homomorphically if the program counter label is public, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq378_HTML.gif , and in full otherwise, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq379_HTML.gif .
Resource Erasure. Since LIO\(_{\mathrm {PAR}}\) manages resources explicitly, the simulation property above requires to define the erasure function for resources as well. The erasure function should preserve information about the resources (e.g., time, memory, and core capabilities) of public threads, since the attacker can explicitly assign resources (e.g., with \( fork \) and \( swap \)) and measure them (e.g., with \( size \)). But what about the resources of secret threads? One might think that such information is secret and thus it should be erased—intuitively, a thread might decide to assign, say, half of its time budget to its secret child depending on secret information. However, public threads can also assign (public) resources to a secret thread when forking: even though these resources currently belong to the secret child, they are temporary—the public parent might reclaim them later. Thus, we cannot associate the sensitivity of the resources of a thread with its program counter label when resources are managed hierarchically, as in LIO\(_{\mathrm {PAR}}\). Instead, we associate the security level of the resources of a secret thread with the sensitivity of its parent: the resources of a secret thread are public information whenever the program counter label of the parent is public and secret information otherwise. Furthermore, since resource reclamation is transitive, the erasure function cannot discard secret resources, but must rather redistribute them to the hierarchically closest set of public resources, as when killing them.
Time Budget. First, we project the identifiers of public threads from the thread pool https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq385_HTML.gif , where notation https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq386_HTML.gif indicates that the program counter label of thread \( n \) is public. Then, the set https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq388_HTML.gif contains the identifiers of all the public threads and their immediate children.15 The resources of threads \( n \;\in \; P \) are public information. However, the program counter label of a thread \( n \;\in \; P \) is not necessarily public, as explained previously. Hence \( P \) can be disjointly partitioned by program counter label: https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq394_HTML.gif , where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq395_HTML.gif and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq396_HTML.gif . Erasure of the budget map then proceeds on this partition, leaving the budget of the public threads untouched, and summing the budget of their secret children threads to the budgets of their descendants, which are instead omitted. In symbols, https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq397_HTML.gif , where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq398_HTML.gif and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq399_HTML.gif .
Queue Erasure. The erasure of core queues follows the same intuition, preserving public and secret threads \( n \;\in \; P \) and trimming all other secret threads https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq401_HTML.gif . Since queues annotate thread ids with their residual time budgets, the erasure function must reassign the budgets of all secret threads https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq402_HTML.gif to their closest ancestor \( n \;\in \; P \) on the same core. The ancestor \( n \;\in \; P \) could be either (i) another secret thread on the same core, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq405_HTML.gif , or, (ii) the spinning thread of that core, \(\circ \;\in \; P \) if there is no other thread \( n \;\in \; P \) on that core—the difference between these two cases lies on whether the original thread \( n' \) was forked or spawned on that core. More formally, if the queue contains no thread \( n \;\in \; P \), then the function replaces the queue altogether with the spinning thread and returns the residual budgets of the threads to it, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq410_HTML.gif if \( n _{i}\;\not \in \; P \) and \({B}\mathrel {=}\sum _{}{ b _{i}}\), for each leaf \( Q {[}\langle n ^{ b _{i}}_{i}\rangle {]}\) where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq414_HTML.gif . Otherwise, the core contains at least a thread https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq415_HTML.gif and the erasure function returns the residual time budget of its secret descendants, i.e., https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq416_HTML.gif by combining the effects of the following mutually recursive functions:
The interesting case is https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq417_HTML.gif , which reassigns the budget of the child (the right leaf https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq418_HTML.gif ) to the parent (the left leaf https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq419_HTML.gif ), by rewriting the subtree into https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq420_HTML.gif .

5.2 Timing-Sensitive Non-interference

The proof of progress- and timing-sensitive non-interference relies on two fundamental properties, i.e., determinacy and simulation of parallel reductions. Determinacy requires that the reduction relation is deterministic.
Proposition 1
(Determinism). If \( c _{1}\hookrightarrow c _{2}\) and \( c _{1}\hookrightarrow c _{3}\) then \( c _{2}\equiv c _{3}\).
The equivalence in the statement denotes alpha-equivalence, i.e., up to the choice of variable names. We now show that the parallel scheduler preserves https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq424_HTML.gif -equivalence of parallel configurations.
Definition 1
( https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq425_HTML.gif -equivalence). Two configurations \( c _{1}\) and \( c _{2}\) are indistinguishable from an attacker at security level https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq428_HTML.gif , written https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq429_HTML.gif , if and only if https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq430_HTML.gif .
Proposition 2
(Parallel simulation). If \( c \hookrightarrow c' \), then https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq432_HTML.gif .
By combining determinism (Proposition 1) and parallel simulation (Proposition 2), we prove progress-insensitive non-interference, which assumes progress of both configurations.
Proposition 3
(Progress-insensitive non-interference). If \( c _{1}\hookrightarrow c _{1}'\), \( c _{2}\hookrightarrow c _{2}'\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq435_HTML.gif , then https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq436_HTML.gif .
In order to lift this result to be progress-sensitive, we first prove timing-sensitive progress. Intuitively, if a valid configuration steps then any low equivalent parallel configuration also steps.16
Proposition 4
(Timing-sensitive progress). Given a valid configuration \( c _{1}\) and a parallel reduction step \( c _{1}\hookrightarrow c _{1}'\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq440_HTML.gif , then there exists \( c _{2}'\), such that \( c _{2}\hookrightarrow c _{2}'\).
Using progress-insensitive non-interference, i.e., Proposition 3 and timing-sensitive progress, i.e., Proposition 4 in combination, we obtain a strong https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq443_HTML.gif -bisimulation property between configurations and prove progress- and timing-sensitive non-interference.
Theorem 1
(Progress- and timing-sensitive non-interference). For all valid configurations \( c _{1}\) and \( c _{2}\), if \( c _{1}\hookrightarrow c _{1}'\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq447_HTML.gif , then there exists a configuration \( c _{2}'\), such that \( c _{2}\hookrightarrow c _{2}'\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq450_HTML.gif .
The following corollary instantiates the non-interference security theorem from above for a given LIO\(_{\mathrm {PAR}}\) parallel program, that explicitly rules out leaks via timing channels. In the following, the notation \(\hookrightarrow _{ u }\) denotes \( u \) reduction steps of the parallel scheduler.
Corollary 1
Given a well-typed LIO\(_{\mathrm {PAR}}\) program \( t \) of type \( Labeled \;\tau _{1}\rightarrow LIO \;\tau _{2}\) and two closed secrets \( t _{\mathrm {1}}^{\circ }, t _{\mathrm {2}}^{\circ }\mathbin {::}\tau _{1}\), let https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq458_HTML.gif , \( c _{i}\mathrel {=}({T}_{i},{B}, H ,\theta ,\mathrm {0},\varPhi _{i})\), where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq460_HTML.gif , https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq461_HTML.gif , https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq462_HTML.gif , https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq463_HTML.gif , https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq464_HTML.gif , for https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq465_HTML.gif , https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq466_HTML.gif and thread identifier https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq467_HTML.gif such that \( n . k \mathrel {=}\mathrm {1}\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq469_HTML.gif . If \( c _{1}\;\hookrightarrow _{ u }\; c _{1}'\), then there exists configuration \( c _{2}'\), such that \( c _{2}\;\hookrightarrow _{ u }\; c _{2}'\) and https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq473_HTML.gif .
To conclude, we show that the timing-sensitive security guarantees of LIO\(_{\mathrm {PAR}}\) extend to concurrent single-core programs by instantiating Corollary 1 with \(\kappa \mathrel {=}\mathrm {1}\).

6 Limitations

Implementation. Implementing LIO\(_{\mathrm {PAR}}\) is a serious undertaking that requires a major redesign of GHC’s runtime system. Conventional runtime systems freely share resources among threads to boost performance and guarantee fairness. For instance, in GHC, threads share heap objects to save memory space and execution time (when evaluating expressions). In contrast, LIO\(_{\mathrm {PAR}}\) strictly partitions resources to enforce security—threads at different security labels cannot share heap objects. As a result, the GHC memory allocator must be adapted to isolate threads’ private heap, so that allocation and collection can occur independently and in parallel. Similarly, the GHC “fair” round robin scheduler must be heavily modified to keep track of and manage threads’ time budget, to preemptively perform a context switch when their time slice is up.
Programming Model. Since resource management is explicit, building applications atop LIO\(_{\mathrm {PAR}}\) introduces new challenges—the programmer must explicitly choose resource bounds for each thread. If done poorly, threads can spend excessive amounts of time sitting idle when given too much CPU time, or garbage collecting when not given enough heap space. The problem of tuning resource allocation parameters is not unique to LIO\(_{\mathrm {PAR}}\)—Yang and Mazières’ [66] propose to use GHC profiling mechanisms to determine heap size while the real-time garbage collector by Henriksson [16] required the programmer to specify the worst case execution time, period, and worst-case allocation of each high-priority thread. Das and Hoffmann [9] demonstrate a more automatic approach—they apply machine learning techniques to statically determine upper bounds on execution time and heap usage of OCaml programs. Similar techniques could be applied to LIO\(_{\mathrm {PAR}}\) in order to determine the most efficient resource partitions. Moreover, this challenge is not unique to real-time systems or LIO\(_{\mathrm {PAR}}\); choosing privacy parameters in differential privacy, for example, shares many similarities [21, 29].
The LIO\(_{\mathrm {PAR}}\) programming model is also likely easier to use in certain application domains—e.g., web applications where the tail latency of a route can inform the thread bounds, or embedded systems where similar latency requirements are the norm. Nevertheless, in order to simplify programming with LIO\(_{\mathrm {PAR}}\), we intend to introduce privileges (and thus declassification) similar to LIO [12, 56] or COWL [57].
Coarse-grained, floating-label systems such as LIO and LIO\(_{\mathrm {PAR}}\) can suffer label creep, wherein the current computation gets tainted to a point where it cannot perform any useful writes [55]. Sequential LIO [56] addresses label creep through a primitive, toLabeled, which executes a computation (that may raise the current label) in a separate context and restores the current label upon its termination. Similar to concurrent LIO [54], LIO\(_{\mathrm {PAR}}\) relies on fork to address label creep and not toLabeled—the latter exposes the termination covert-channel [54]. Even though LIO\(_{\mathrm {PAR}}\) has a more restricted floating-label semantics than concurrent LIO, LIO\(_{\mathrm {PAR}}\) also supports parallel execution, garbage collection, and new APIs for getting heap statistics, counting elapsed time, and killing threads.
There is substantial work on language-level IFC systems [10, 15, 20, 34, 43, 50, 51, 54, 55, 67, 68]. Our work builds on these efforts in several ways. Firstly, LIO\(_{\mathrm {PAR}}\) extends the concurrent LIO IFC system [54] with parallelism—to our knowledge, this is the first dynamic IFC system to support parallelism and address the internalization of external timing channels. Previous static IFC systems implicitly allow for parallelism, e.g., Muller and Chong’s [41], several works on IFC \(\pi \)-calculi [18, 19, 25], and Rafnsson et al. [49] recent foundations for composable timing-sensitive interactive systems. These efforts, however, do not model runtime system resource management. Volpano and Smith [64] enforce a timing agreement condition, similar to ours, but for a static concurrent IFC system. Mantel et al. [37] and Li et al. [31] prove non-interference for static, concurrent systems, using rely-guarantee reasoning.
Unlike most of these previous efforts, our hierarchical runtime system also eliminates classes of resource-based external timing channels, such as memory exhaustion and garbage collection. Pedersen and Askarov [46], however, were the first to identify automatic memory management to be a source of covert channels for IFC systems and demonstrate the feasibility of attacks against both V8 and the JVM. They propose a sequential static IFC language with labeled-partitioned memory and a label-aware timing-sensitive garbage collector, which is vulnerable to external timing attacks and satisfies only termination-insensitive non-interference.
Previous work on language-based systems—namely [35, 66]—identify memory retention and memory exhaustion as a source of denial-of-service (DOS) attacks. Memory retention and exhaustion can also be used as covert channels. In addressing those covert channels, LIO\(_{\mathrm {PAR}}\) also addresses the DOS attacks outlined by these efforts. Indeed, our work generalizes Yang and Mazières’ [66] region-based allocation framework with region-based garbage collection and hierarchical scheduling.
Our LIO\(_{\mathrm {PAR}}\) design also borrows ideas from the secure operating system community. Our explicit hierarchical memory management is conceptually similar to HiStar’s container abstraction [69]. In HiStar, containers—subject to quotas, i.e., space limits—are used to hierarchically allocate and deallocate objects. LIO\(_{\mathrm {PAR}}\) adopts this idea at the language-level and automates the allocation and reclamation. Moreover, we hierarchically partition CPU-time; Zeldovich et al. [69], however, did observe that their container abstraction can be repurposed to enforce CPU quotas. Deterland [65] splits time into ticks to address internal timing channels and mitigate external timing ones. Deterland builds on Determinator [4], an OS that executes parallel applications deterministically and efficiently. LIO\(_{\mathrm {PAR}}\) adopts many ideas from these systems—both the deterministic parallelism and ticks (semantic steps)—to the language-level. Deterministic parallelism at the language-level has also been explored previous to this work [27, 28, 38], but, different from these efforts, LIO\(_{\mathrm {PAR}}\) also hierarchically manages resources to eliminate classes of external timing channels.
Fabric [33, 34] and DStar [70] are distributed IFC systems. Though we believe that our techniques would scale beyond multi-core systems (e.g., to data centers), LIO\(_{\mathrm {PAR}}\) will likely not easily scale to large distributed systems like Fabric and DStar. Different from Fabric and DStar, however, LIO\(_{\mathrm {PAR}}\) addresses both internal and external timing channels that result from running code in parallel.
Our hierarchical resource management approach is not unique—other countermeasures to external timing channels have been studied. Hu [22], for example, mitigates both timing channels in the VAX/VMM system [32] using “fuzzy time”—an idea recently adopted to browsers [26]. Askarov et al.’s [2] mitigate external timing channels using predicative black-box mitigation, which delays events and thus bound information leakage. Rather than using noise as in the fuzzy time technique, however, they predict the schedule of future events. Some of these approaches have also been adopted at the language-level [46, 54, 71]. We find these techniques largely orthogonal: they can be used alongside our techniques to mitigate timing channels we do not eliminate.
Real-time systems—when developed with garbage collected languages [3, 5, 6, 16]—face similar challenges as this work. Blelloch and Cheng [6] describe a real-time garbage collector (RTGC) for multi-core programs with provable resource bounds—LIO\(_{\mathrm {PAR}}\) enforces resource bounds instead. A more recent RTGC created by Auerbach et al. [3] describes a technique to “tax” threads into contributing to garbage collection as they utilize more resources. Henricksson [16] describes a RTGC capable of enforcing hard and soft deadlines, once given upper bounds on space and time resources used by threads. Most similarly to LIO\(_{\mathrm {PAR}}\), Pizlo et al. [48] implement a hierarchical RTGC algorithm that independently collects partitioned heaps.

8 Conclusion

Language-based IFC systems built atop off-the-shelf runtime systems are vulnerable to resource-based external-timing attacks. When these systems are extended with thread parallelism these attacks become yet more vicious—they can be carried out internally. We presented LIO\(_{\mathrm {PAR}}\), the design of the first dynamic IFC hierarchical runtime system that supports deterministic parallelism and eliminate s both resource-based internal- and external-timing covert channels. To our knowledge, LIO\(_{\mathrm {PAR}}\) is the first parallel system to satisfy progress- and timing-sensitive non-interference.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Fußnoten
1
A more assiduous attacker could craft similar attacks that leak at higher bit-rates.
 
2
The attacker needs to empirically find parameter n, so that \(p_1\) writes roughly twice as much as thread \(p_0\) with half CPU time on core \(c_0\).
 
3
We use record notation, i.e., \(\mu .h\) and \(\mu . cl \), to access the components of \(\mu \).
 
4
The calculus does not feature lazy evaluation. Laziness, because of sharing, introduces a covert channel, which has already been considered in previous work [59].
 
5
To simplify reasoning, our generic memory model is basic and assumes a uniform size for all the objects stored in the heap. We believe that it is possible to refine our generic model with more accurate memory models (e.g., GHC’s tagless G-machine (STG) [23], the basis for GHC’s runtime [39]), but leave this to future work.
 
6
Even though the stack size is unbounded in this model, we could account for its memory usage by explicitly allocating it on the heap, in the style of Yang et al. [66].
 
7
The labels form a security lattice \((\mathscr {L},\sqcup ,\sqsubseteq )\).
 
8
When implemented, this procedure might introduce a timing channel that leaks the number of threads running on the core. In practice, techniques from real time schedulers can be used to protect against such timing channels. The model of LIO\(_{\mathrm {PAR}}\) does not capture the execution time of the runtime system itself and thus this issue does not arise in the security proofs.
 
9
An external attacker can take timing measurements using network communications. An attacker equipped with an internal clock is equally powerful but simpler to formalize [46].
 
10
In practice a garbage collection cycle takes time that is proportional to the size of the memory used by the thread. That does not hinder security as long as the garbage collector runs on the thread’s time budget.
 
11
Non-deterministic updates would make the model vulnerable to refinement attacks [40].
 
12
Since the clock only needs to be incremented, we could have left it out from the configuration \( c \mathrel {=}\langle T' ,{B}, H ,\theta ,\varSigma .\omega \mathbin {+}\mathrm {1},\varPhi '\rangle \); function https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq305_HTML.gif does not use nor change its value.
 
13
Notice that \({\vert }\varDelta {\vert }\;<\;h\) by rule [Fork].
 
14
For ease of exposition, we use the two-point lattices https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq365_HTML.gif , where https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq366_HTML.gif is the only disallowed flow. Neither our proofs nor our model rely on this particular lattice.
 
15
The id of the spinning thread on each free core is also public, i.e., \(\circ _{ k }\;\in \; P \) for https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-17138-4_1/480689_1_En_1_IEq390_HTML.gif .
 
16
A configuration is valid if satisfies several basic properties, e.g., it does not contain special term \(\bullet \). See the extended version of this paper for details.
 
Literatur
2.
Zurück zum Zitat Askarov, A., Zhang, D., Myers, A.C.: Predictive black-box mitigation of timing channels. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 297–307. ACM (2010) Askarov, A., Zhang, D., Myers, A.C.: Predictive black-box mitigation of timing channels. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 297–307. ACM (2010)
3.
Zurück zum Zitat Auerbach, J., et al.: Tax-and-spend: democratic scheduling for real-time garbage collection. In: Proceedings of the 8th ACM International Conference on Embedded Software, pp. 245–254. ACM (2008) Auerbach, J., et al.: Tax-and-spend: democratic scheduling for real-time garbage collection. In: Proceedings of the 8th ACM International Conference on Embedded Software, pp. 245–254. ACM (2008)
4.
Zurück zum Zitat Aviram, A., Weng, S.-C., Hu, S., Ford, B.: Efficient system-enforced deterministic parallelism. Commun. ACM 55(5), 111–119 (2012)CrossRef Aviram, A., Weng, S.-C., Hu, S., Ford, B.: Efficient system-enforced deterministic parallelism. Commun. ACM 55(5), 111–119 (2012)CrossRef
5.
Zurück zum Zitat Baker Jr., H.G.: List processing in real time on a serial computer. Commun. ACM 21(4), 280–294 (1978)CrossRef Baker Jr., H.G.: List processing in real time on a serial computer. Commun. ACM 21(4), 280–294 (1978)CrossRef
6.
Zurück zum Zitat Blelloch, G.E., Cheng, P.: On bounding time and space for multiprocessor garbage collection. ACM SIGPLAN Not. 34, 104–117 (1999)CrossRef Blelloch, G.E., Cheng, P.: On bounding time and space for multiprocessor garbage collection. ACM SIGPLAN Not. 34, 104–117 (1999)CrossRef
8.
Zurück zum Zitat Buiras, P., Vytiniotis, D., Russo, A.: HLIO: mixing static and dynamic typing for information-flow control in Haskell. In: ACM SIGPLAN International Conference on Functional Programming. ACM (2015) Buiras, P., Vytiniotis, D., Russo, A.: HLIO: mixing static and dynamic typing for information-flow control in Haskell. In: ACM SIGPLAN International Conference on Functional Programming. ACM (2015)
10.
Zurück zum Zitat Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., Prakash, A.: FlowFence: practical data protection for emerging IoT application frameworks. In: USENIX Security Symposium, pp. 531–548 (2016) Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., Prakash, A.: FlowFence: practical data protection for emerging IoT application frameworks. In: USENIX Security Symposium, pp. 531–548 (2016)
11.
Zurück zum Zitat Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptographic Eng. 8, 1–27 (2016)CrossRef Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptographic Eng. 8, 1–27 (2016)CrossRef
12.
Zurück zum Zitat Giffin, D.B., et al.: Hails: protecting data privacy in untrusted web applications. J. Comput. Secur. 25(4–5), 427–461 (2017)CrossRef Giffin, D.B., et al.: Hails: protecting data privacy in untrusted web applications. J. Comput. Secur. 25(4–5), 427–461 (2017)CrossRef
13.
Zurück zum Zitat Giffin, D.B., et al.: Hails: protecting data privacy in untrusted web applications. In: Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX (2012) Giffin, D.B., et al.: Hails: protecting data privacy in untrusted web applications. In: Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX (2012)
14.
Zurück zum Zitat Goguen, J.A., Meseguer, J.: Unwinding and inference control, pp. 75–86, April 1984 Goguen, J.A., Meseguer, J.: Unwinding and inference control, pp. 75–86, April 1984
15.
Zurück zum Zitat Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in JavaScript and its APIs. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1663–1671. ACM (2014) Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in JavaScript and its APIs. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1663–1671. ACM (2014)
16.
Zurück zum Zitat Henriksson, R.: Scheduling garbage collection in embedded systems. Ph.D. thesis, Department of Computer Science (1998) Henriksson, R.: Scheduling garbage collection in embedded systems. Ph.D. thesis, Department of Computer Science (1998)
19.
Zurück zum Zitat Honda, K., Yoshida, N.: A uniform type structure for secure information flow. ACM Trans. Program. Lang. Syst. (TOPLAS) 29(6), 31 (2007)CrossRef Honda, K., Yoshida, N.: A uniform type structure for secure information flow. ACM Trans. Program. Lang. Syst. (TOPLAS) 29(6), 31 (2007)CrossRef
20.
Zurück zum Zitat Hritcu, C., Greenberg, M., Karel, B., Pierce, B.C., Morrisett, G.: All your IFCException are belong to us. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 3–17. IEEE (2013) Hritcu, C., Greenberg, M., Karel, B., Pierce, B.C., Morrisett, G.: All your IFCException are belong to us. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 3–17. IEEE (2013)
21.
Zurück zum Zitat Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: Proceedings of the 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014, pp. 398–410. IEEE Computer Society, Washington, DC (2014) Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: Proceedings of the 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014, pp. 398–410. IEEE Computer Society, Washington, DC (2014)
22.
Zurück zum Zitat Hu, W.-M.: Reducing timing channels with fuzzy time. J. Comput. Secur. 1(3–4), 233–254 (1992)CrossRef Hu, W.-M.: Reducing timing channels with fuzzy time. J. Comput. Secur. 1(3–4), 233–254 (1992)CrossRef
23.
Zurück zum Zitat Jones, S.L.P.: Implementing lazy functional languages on stock hardware: the spineless tagless G-machine. J. Funct. Program. 2, 127–202 (1992)CrossRef Jones, S.L.P.: Implementing lazy functional languages on stock hardware: the spineless tagless G-machine. J. Funct. Program. 2, 127–202 (1992)CrossRef
24.
Zurück zum Zitat Kemmerer, R.A.: Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Comput. Syst. (TOCS) 1(3), 256–277 (1983)CrossRef Kemmerer, R.A.: Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Comput. Syst. (TOCS) 1(3), 256–277 (1983)CrossRef
25.
Zurück zum Zitat Kobayashi, N.: Type-based information flow analysis for the \(\pi \)-calculus. Acta Informatica 42(4–5), 291–347 (2005)MathSciNetCrossRef Kobayashi, N.: Type-based information flow analysis for the \(\pi \)-calculus. Acta Informatica 42(4–5), 291–347 (2005)MathSciNetCrossRef
26.
Zurück zum Zitat Kohlbrenner, D., Shacham, H.: Trusted browsers for uncertain times. In: USENIX Security Symposium, pp. 463–480 (2016) Kohlbrenner, D., Shacham, H.: Trusted browsers for uncertain times. In: USENIX Security Symposium, pp. 463–480 (2016)
27.
Zurück zum Zitat Kuper, L., Newton, R.R.: LVars: lattice-based data structures for deterministic parallelism. In: Proceedings of the 2nd ACM SIGPLAN Workshop on Functional High-Performance Computing, pp. 71–84. ACM (2013) Kuper, L., Newton, R.R.: LVars: lattice-based data structures for deterministic parallelism. In: Proceedings of the 2nd ACM SIGPLAN Workshop on Functional High-Performance Computing, pp. 71–84. ACM (2013)
28.
Zurück zum Zitat Kuper, L., Todd, A., Tobin-Hochstadt, S., Newton, R.R.: Taming the parallel effect zoo: extensible deterministic parallelism with LVish. ACM SIGPLAN Not. 49(6), 2–14 (2014)CrossRef Kuper, L., Todd, A., Tobin-Hochstadt, S., Newton, R.R.: Taming the parallel effect zoo: extensible deterministic parallelism with LVish. ACM SIGPLAN Not. 49(6), 2–14 (2014)CrossRef
30.
32.
Zurück zum Zitat Lipner, S., Jaeger, T., Zurko, M.E.: Lessons from VAX/SVS for high-assurance VM systems. IEEE Secur. Priv. 10(6), 26–35 (2012) Lipner, S., Jaeger, T., Zurko, M.E.: Lessons from VAX/SVS for high-assurance VM systems. IEEE Secur. Priv. 10(6), 26–35 (2012)
33.
Zurück zum Zitat Liu, J., Arden, O., George, M.D., Myers, A.C.: Fabric: building open distributed systems securely by construction. J. Comput. Secur. 25(4–5), 367–426 (2017)CrossRef Liu, J., Arden, O., George, M.D., Myers, A.C.: Fabric: building open distributed systems securely by construction. J. Comput. Secur. 25(4–5), 367–426 (2017)CrossRef
34.
Zurück zum Zitat Liu, J., George, M.D., Vikram, K., Qi, X., Waye, L., Myers, A.C.: Fabric: a platform for secure distributed computation and storage. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. ACM (2009) Liu, J., George, M.D., Vikram, K., Qi, X., Waye, L., Myers, A.C.: Fabric: a platform for secure distributed computation and storage. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. ACM (2009)
36.
Zurück zum Zitat Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Comput. Secur. 11(4), 615–676 (2003)CrossRef Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Comput. Secur. 11(4), 615–676 (2003)CrossRef
37.
Zurück zum Zitat Mantel, H., Sands, D., Sudbrock, H.: Assumptions and guarantees for compositional noninterference. In: 2011 IEEE 24th Computer Security Foundations Symposium, pp. 218–232, June 2011 Mantel, H., Sands, D., Sudbrock, H.: Assumptions and guarantees for compositional noninterference. In: 2011 IEEE 24th Computer Security Foundations Symposium, pp. 218–232, June 2011
38.
Zurück zum Zitat Marlow, S., Newton, R., Peyton Jones, S.: A monad for deterministic parallelism. ACM SIGPLAN Not. 46(12), 71–82 (2012)CrossRef Marlow, S., Newton, R., Peyton Jones, S.: A monad for deterministic parallelism. ACM SIGPLAN Not. 46(12), 71–82 (2012)CrossRef
39.
Zurück zum Zitat Marlow, S., Peyton Jones, S.: Making a fast curry: push/enter vs. eval/apply for higher-order languages. J. Funct. Program. 16(4–5), 415–449 (2006)MathSciNetCrossRef Marlow, S., Peyton Jones, S.: Making a fast curry: push/enter vs. eval/apply for higher-order languages. J. Funct. Program. 16(4–5), 415–449 (2006)MathSciNetCrossRef
40.
Zurück zum Zitat McCullough, D.: Specifications for multi-level security and a hook-up. In: 1987 IEEE Symposium on Security and Privacy (SP), p. 161, April 1987 McCullough, D.: Specifications for multi-level security and a hook-up. In: 1987 IEEE Symposium on Security and Privacy (SP), p. 161, April 1987
41.
Zurück zum Zitat Muller, S., Chong, S.: Towards a practical secure concurrent language. In: Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming Languages, Systems, Languages, and Applications, pp. 57–74. ACM Press, New York, October 2012 Muller, S., Chong, S.: Towards a practical secure concurrent language. In: Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming Languages, Systems, Languages, and Applications, pp. 57–74. ACM Press, New York, October 2012
42.
Zurück zum Zitat Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif 3.0: Java information flow, July 2006 Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif 3.0: Java information flow, July 2006
43.
Zurück zum Zitat Nadkarni, A., Andow, B., Enck, W., Jha, S.: Practical DIFC enforcement on android. In: USENIX Security Symposium, pp. 1119–1136 (2016) Nadkarni, A., Andow, B., Enck, W., Jha, S.: Practical DIFC enforcement on android. In: USENIX Security Symposium, pp. 1119–1136 (2016)
45.
Zurück zum Zitat Parker, J.L.: LMonad: information flow control for Haskell web applications. Ph.D. thesis, University of Maryland, College Park (2014) Parker, J.L.: LMonad: information flow control for Haskell web applications. Ph.D. thesis, University of Maryland, College Park (2014)
46.
Zurück zum Zitat Pedersen, M.V., Askarov, A.: From trash to treasure: timing-sensitive garbage collection. In: Proceedings of the 38th IEEE Symposium on Security and Privacy. IEEE (2017) Pedersen, M.V., Askarov, A.: From trash to treasure: timing-sensitive garbage collection. In: Proceedings of the 38th IEEE Symposium on Security and Privacy. IEEE (2017)
47.
Zurück zum Zitat Percival, C.: Cache missing for fun and profit (2005) Percival, C.: Cache missing for fun and profit (2005)
48.
Zurück zum Zitat Pizlo, F., Hosking, A.L., Vitek, J.: Hierarchical real-time garbage collection. In: Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, LCTES 2007, pp. 123–133. ACM, New York (2007) Pizlo, F., Hosking, A.L., Vitek, J.: Hierarchical real-time garbage collection. In: Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, LCTES 2007, pp. 123–133. ACM, New York (2007)
50.
Zurück zum Zitat Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control, vol. 44. ACM (2009) Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control, vol. 44. ACM (2009)
51.
Zurück zum Zitat Russo, A.: Functional pearl: two can keep a secret, if one of them uses Haskell. ACM SIGPLAN Not. 50, 280–288 (2015)MathSciNetCrossRef Russo, A.: Functional pearl: two can keep a secret, if one of them uses Haskell. ACM SIGPLAN Not. 50, 280–288 (2015)MathSciNetCrossRef
52.
Zurück zum Zitat Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proceedings of the 13th IEEE Workshop on Computer Security Foundations, CSFW 2000, p. 200. IEEE Computer Society, Washington, DC (2000) Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proceedings of the 13th IEEE Workshop on Computer Security Foundations, CSFW 2000, p. 200. IEEE Computer Society, Washington, DC (2000)
54.
Zurück zum Zitat Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J.C., Mazières, D.: Addressing covert termination and timing channels in concurrent information flow systems. In: International Conference on Functional Programming (ICFP). ACM SIGPLAN, September 2012 Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J.C., Mazières, D.: Addressing covert termination and timing channels in concurrent information flow systems. In: International Conference on Functional Programming (ICFP). ACM SIGPLAN, September 2012
55.
Zurück zum Zitat Stefan, D., Russo, A., Mazières, D., Mitchell, J.C.: Flexible dynamic information flow control in the presence of exceptions. J. Funct. Program. 27 (2017) Stefan, D., Russo, A., Mazières, D., Mitchell, J.C.: Flexible dynamic information flow control in the presence of exceptions. J. Funct. Program. 27 (2017)
56.
Zurück zum Zitat Stefan, D., Russo, A., Mitchell, J.C., Mazières, D.: Flexible dynamic information flow control in Haskell. In: Haskell Symposium. ACM SIGPLAN, September 2011 Stefan, D., Russo, A., Mitchell, J.C., Mazières, D.: Flexible dynamic information flow control in Haskell. In: Haskell Symposium. ACM SIGPLAN, September 2011
57.
Zurück zum Zitat Stefan, D., et al.: Protecting users by confining JavaScript with COWL. In: USENIX Symposium on Operating Systems Design and Implementation. USENIX Association (2014) Stefan, D., et al.: Protecting users by confining JavaScript with COWL. In: USENIX Symposium on Operating Systems Design and Implementation. USENIX Association (2014)
58.
Zurück zum Zitat Tsai, T.-C., Russo, A., Hughes, J.: A library for secure multi-threaded information flow in Haskell. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 187–202. IEEE (2007) Tsai, T.-C., Russo, A., Hughes, J.: A library for secure multi-threaded information flow in Haskell. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 187–202. IEEE (2007)
59.
Zurück zum Zitat Vassena, M., Breitner, J., Russo, A.: Securing concurrent lazy programs against information leakage. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, 21–25 August 2017, pp. 37–52 (2017) Vassena, M., Breitner, J., Russo, A.: Securing concurrent lazy programs against information leakage. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, 21–25 August 2017, pp. 37–52 (2017)
61.
Zurück zum Zitat Vassena, M., Russo, A.: On formalizing information-flow control libraries. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS 2016, pp. 15–28. ACM, New York (2016) Vassena, M., Russo, A.: On formalizing information-flow control libraries. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS 2016, pp. 15–28. ACM, New York (2016)
62.
Zurück zum Zitat Vassena, M., Russo, A., Buiras, P., Waye, L.: MAC a verified static information-flow control library. J. Log. Algebraic Methods Program. (2017) Vassena, M., Russo, A., Buiras, P., Waye, L.: MAC a verified static information-flow control library. J. Log. Algebraic Methods Program. (2017)
63.
Zurück zum Zitat Vila, P., Köpf, B.: Loophole: timing attacks on shared event loops in chrome. In: USENIX Security Symposium (2017) Vila, P., Köpf, B.: Loophole: timing attacks on shared event loops in chrome. In: USENIX Security Symposium (2017)
64.
Zurück zum Zitat Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: Proceedings of the 10th IEEE Workshop on Computer Security Foundations, CSFW 1997, p. 156. IEEE Computer Society, Washington, DC (1997) Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: Proceedings of the 10th IEEE Workshop on Computer Security Foundations, CSFW 1997, p. 156. IEEE Computer Society, Washington, DC (1997)
65.
Zurück zum Zitat Wu, W., Zhai, E., Wolinsky, D.I., Ford, B., Gu, L., Jackowitz, D.: Warding off timing attacks in Deterland. In: Conference on Timely Results in Operating Systems, Monterey, CS, US (2015) Wu, W., Zhai, E., Wolinsky, D.I., Ford, B., Gu, L., Jackowitz, D.: Warding off timing attacks in Deterland. In: Conference on Timely Results in Operating Systems, Monterey, CS, US (2015)
66.
Zurück zum Zitat Yang, E.Z., Mazières, D.: Dynamic space limits for Haskell. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, pp. 588–598. ACM, New York (2014) Yang, E.Z., Mazières, D.: Dynamic space limits for Haskell. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, pp. 588–598. ACM, New York (2014)
67.
Zurück zum Zitat Yang, J., Hance, T., Austin, T.H., Solar-Lezama, A., Flanagan, C., Chong, S.: Precise, dynamic information flow for database-backed applications. ACM SIGPLAN Not. 51, 631–647 (2016)CrossRef Yang, J., Hance, T., Austin, T.H., Solar-Lezama, A., Flanagan, C., Chong, S.: Precise, dynamic information flow for database-backed applications. ACM SIGPLAN Not. 51, 631–647 (2016)CrossRef
68.
Zurück zum Zitat Yang, J., Yessenov, K., Solar-Lezama, A.: A language for automatically enforcing privacy policies. ACM SIGPLAN Not. 47, 85–96 (2012)CrossRef Yang, J., Yessenov, K., Solar-Lezama, A.: A language for automatically enforcing privacy policies. ACM SIGPLAN Not. 47, 85–96 (2012)CrossRef
69.
Zurück zum Zitat Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making information flow explicit in HiStar. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 263–278. USENIX Association (2006) Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making information flow explicit in HiStar. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 263–278. USENIX Association (2006)
70.
Zurück zum Zitat Zeldovich, N., Boyd-Wickizer, S., Mazieres, D.: Securing distributed systems with information flow control. NSDI 8, 293–308 (2008) Zeldovich, N., Boyd-Wickizer, S., Mazieres, D.: Securing distributed systems with information flow control. NSDI 8, 293–308 (2008)
71.
Zurück zum Zitat Zhang, D., Askarov, A., Myers, A.C.: Predictive mitigation of timing channels in interactive systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 563–574. ACM (2011) Zhang, D., Askarov, A., Myers, A.C.: Predictive mitigation of timing channels in interactive systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 563–574. ACM (2011)
Metadaten
Titel
Foundations for Parallel Information Flow Control Runtime Systems
verfasst von
Marco Vassena
Gary Soeller
Peter Amidon
Matthew Chan
John Renner
Deian Stefan
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-17138-4_1