Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies

被引:27
作者
Askarov, Aslan [1 ]
Chong, Stephen [1 ]
机构
[1] Harvard Univ, Cambridge, MA 02138 USA
来源
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2012年
关键词
INFORMATION-FLOW; MODEL;
D O I
10.1109/CSF.2012.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In systems that handle confidential information, the security policy to enforce on information frequently changes: new users join the system, old users leave, and sensitivity of data changes over time. It is challenging, yet important, to specify what it means for such systems to be secure, and to gain assurance that a system is secure. We present a language-based model for specifying, reasoning about, and enforcing information security in systems that dynamically change the security policy. We specify security for such systems as a simple and intuitive extensional knowledge-based semantic condition: an attacker can only learn information in accordance with the current security policy. Importantly, the semantic condition is parameterized by the ability of the attacker. Learning is about change in knowledge, and an observation that allows one attacker to learn confidential information may provide a different attacker with no new information. A program that is secure against an attacker with perfect recall may not be secure against a more realistic, weaker, attacker. We introduce a compositional model of attackers that simplifies enforcement of security, and demonstrate that standard information-flow control mechanisms, such as security-type systems and information-flow monitors, can be easily adapted to enforce security for a broad and useful class of attackers.
引用
收藏
页码:308 / 322
页数:15
相关论文
共 37 条
[1]  
[Anonymous], 2006, P AS COMP SCI C SEC
[2]  
Askarov A., 2012, TR0212 HARV SCH ENG
[3]  
Askarov A., 2010, P 19 EUR S PROGR
[4]  
ASKAROV A, 2009, P IEEE COMP SEC FDN
[5]  
Askarov Aslan, 2008, P 13 EUR S RES COMP
[6]  
Balliu M., 2011, P ACM SIGPLAN 6 WORK
[7]  
Broberg N, 2006, LECT NOTES COMPUT SC, V3924, P180
[8]  
Broberg N., 2009, P ACM SIGPLAN 4 WORK
[9]  
Broberg N., 2010, P 37 ANN ACM SIGACT
[10]   Required Information Release [J].
Chong, Stephen .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :215-227