Cryptographically sound implementations for typed information-flow security

被引:5
作者
Fournet, Cedric
Rezk, Tamara
机构
[1] Microsoft Research, MSR-INRIA Joint Centre
关键词
security; verification; design; languages; secure information flow; confidentiality; integrity; non-interference; type systems; compilers; probabilistic programs; cryptography; computational model;
D O I
10.1145/1328897.1328478
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels of trust. These policies enable a simple treatment of security, and they can often be verified by typing. However, their enforcement in concrete systems involves delicate compilation issues. We consider cryptographic enforcement mechanisms for imperative programs with untrusted components. Such programs may represent, for instance, distributed systems connected by some untrusted network. In source programs, security depends on an abstract access-control policy for reading and writing the shared memory. In their implementations, shared memory is unprotected and security depends instead on encryption and signing. We build a translation from well-typed source programs and policies to cryptographic implementations. To establish its correctness, we develop a type system for the target language. Our typing rules enforce a correct usage of cryptographic primitives against active adversaries; from an information-flow viewpoint, they capture controlled forms of robust declassification and endorsement. We show type soundness for a variant of the non-interference property, then show that our translation preserves typability. We rely on concrete primitives and hypotheses for cryptography, stated in terms of probabilistic polynomial-time algorithms and games. We model these primitives as commands in our target language. Thus, we develop a uniform language-based model of security, ranging from computational non-interference for probabilistic programs down to standard cryptographic hypotheses.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 27 条