Nonmalleable Information Flow Control

被引:19
作者
Cecchetti, Ethan [1 ]
Myers, Andrew C. [1 ]
Arden, Owen [2 ,3 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
[2] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
[3] Harvard Univ, Cambridge, MA 02138 USA
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
基金
美国国家科学基金会;
关键词
Downgrading; Information security; Security types;
D O I
10.1145/3133956.3134054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system. Unfortunately, it is too restrictive for real systems. Mechanisms for downgrading information are needed to capture real-world security requirements, but downgrading eliminates the strong compositional security guarantees of noninterference. We introduce nonmalleable information flow, a new formal security condition that generalizes noninterference to permit controlled downgrading of both confidentiality and integrity. While previous work on robust declassification prevents adversaries from exploiting the downgrading of confidentiality, our key insight is transparent endorsement, a mechanism for downgrading integrity while defending against adversarial exploitation. Robust declassification appeared to break the duality of confidentiality and integrity by making confidentiality depend on integrity, but transparent endorsement makes integrity depend on confidentiality, restoring this duality. We show how to extend a security-typed programming language with transparent endorsement and prove that this static type system enforces nonmalleable information flow, a new security property that subsumes robust declassification and transparent endorsement. Finally, we describe an implementation of this type system in the context of Flame, a flow-limited authorization plugin for the Glasgow Haskell Compiler.
引用
收藏
页码:1875 / 1891
页数:17
相关论文
共 46 条
[21]  
Krohn Maxwell, 2007, 21 ACM S OP SYST PRI
[22]  
Li Peng, 2006, 19 IEEE COMP SEC FDN
[23]   A Theory of Information-Flow Labels [J].
Montagu, Benoit ;
Pierce, Benjamin C. ;
Pollack, Randy .
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, :3-17
[24]  
Myers A. C., 1999, Conference Record of POPL '99. 26th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P228, DOI 10.1145/292540.292561
[25]   Protecting privacy using the decentralized label model [J].
Myers, AC ;
Liskov, B .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) :410-442
[26]   Enforcing Robust Declassification and Qualified Robustness [J].
Myers, Andrew ;
Sabelfeld, Andrei ;
Zdancewic, Steve .
JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) :157-196
[27]   Verification of Information Flow and Access Control Policies with Dependent Types [J].
Nanevski, Aleksandar ;
Banerjee, Anindya ;
Garg, Deepak .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :165-179
[28]  
PINSKY S, 1995, P IEEE S SECUR PRIV, P102, DOI 10.1109/SECPRI.1995.398926
[29]   Information flow inference for ML [J].
Pottier, F ;
Simonet, V .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 25 (01) :117-158
[30]   Information flow inference for free [J].
Pottier, F ;
Conchon, S .
ACM SIGPLAN NOTICES, 2000, 35 (09) :46-57