Information Flow Monitoring as Abstract Interpretation for Relational Logic

被引:15
作者
Chudnov, Andrey [1 ]
Kuan, George [2 ]
Naumann, David A. [1 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] HRL Labs LLC, Malibu, CA USA
来源
2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2014年
关键词
D O I
10.1109/CSF.2014.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A number of systems have been developed for dynamic information flow control (IFC). In such systems, the security policy is expressed by labeling input and output channels; it is enforced by tracking and checking labels on data. Systems have been proven to enforce some form of noninterference (NI), formalized as a property of two runs of the program. In practice, NI is too strong and it is desirable to enforce some relaxation of NI that allows downgrading under constraints that have been classified as 'what', 'where', 'who', or 'when' policies. To encompass a broad range of policies, relational logic has been proposed as a means to specify and statically enforce policy. This paper shows how relational logic policies can be dynamically checked. To do so, we provide a new account of monitoring, in which the monitor state is viewed as an abstract interpretation of sets of pairs of program runs.
引用
收藏
页码:48 / 62
页数:15
相关论文
共 38 条
[1]  
Amtoft T, 2004, LECT NOTES COMPUT SC, V3148, P100
[2]  
AMTOFT T, 2006, ACM S PRINC PROGR LA
[3]  
AMTOFT T, 2008, LNCS, V5014
[4]  
Amtoft T., 2010, LNCS, V6012
[5]  
Askarov A., 2009, IEEE COMP SEC FDN S
[6]   Gradual release: Unifying declassification, encryption and key release policies [J].
Askarov, Aslan ;
Sabelfeld, Andrei .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :207-+
[7]   ATTACKER CONTROL AND IMPACT FOR CONFIDENTIALITY AND INTEGRITY [J].
Askarov, Aslan ;
Myers, Andrew C. .
LOGICAL METHODS IN COMPUTER SCIENCE, 2011, 7 (03)
[8]  
Austin T. H., 2012, LNCS, V7705
[9]  
Austin T.H., 2012, POPL
[10]  
Austin T. H., 2010, ACM WORKSH PROGR LAN