A verified information-flow architecture

被引:9
|
作者
de Amorim, Arthur Azevedo [1 ]
Collins, Nathan [7 ]
DeHon, Andre [1 ]
Demange, Delphine [5 ]
Hritcu, Catalin [3 ]
Pichardie, David [6 ]
Pierce, Benjamin C. [1 ]
Pollack, Randy [4 ]
Tolmach, Andrew [2 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
[2] Portland State Univ, Portland, OR 97207 USA
[3] INRIA, Paris, France
[4] Harvard Univ, Boston, MA 02115 USA
[5] Univ Rennes 1, IRISA, Rennes, France
[6] ENS Rennes, IRISA, Rennes, France
[7] Galois Inc, Portland, OR USA
关键词
Security; clean-slate design; tagged architecture; information-flow control; formal verification; refinement;
D O I
10.3233/JCS-15784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for tracking and limiting information flows. At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed. The operating system virtualizes these generic facilities to present an information-flow abstract machine that allows user programs to label sensitive data with rich confidentiality policies. We present a formal, machine-checked model of the key hardware and software mechanisms used to dynamically control information flow in SAFE and an end-to-end proof of noninterference for this model. We use a refinement proof methodology to propagate the noninterference property of the abstract machine down to the concrete machine level. We use an intermediate layer in the refinement chain that factors out the details of the information-flow control policy and devise a code generator for compiling such information-flow policies into low-level monitor code. Finally, we verify the correctness of this generator using a dedicated Hoare logic that abstracts from low-level machine instructions into a reusable set of verified structured code generators.
引用
收藏
页码:689 / 734
页数:46
相关论文
共 50 条
  • [21] INFORMATION-FLOW AND WORKER PRODUCTIVITY
    GOLDMAN, AS
    [J]. MANAGEMENT SCIENCE, 1959, 5 (03) : 270 - 278
  • [22] A Theory of Information-Flow Labels
    Montagu, Benoit
    Pierce, Benjamin C.
    Pollack, Randy
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 3 - 17
  • [23] INFORMATION-FLOW IN SENSORY NEURONS
    DEWEESE, M
    BIALEK, W
    [J]. NUOVO CIMENTO DELLA SOCIETA ITALIANA DI FISICA D-CONDENSED MATTER ATOMIC MOLECULAR AND CHEMICAL PHYSICS FLUIDS PLASMAS BIOPHYSICS, 1995, 17 (7-8): : 733 - 741
  • [24] INFORMATION-FLOW IN SYNERGETIC COMPUTERS
    HAKEN, H
    [J]. ANNALEN DER PHYSIK, 1991, 48 (1-3) : 97 - 102
  • [25] INFORMATION-FLOW IN THE AUTOMATED LABORATORY
    SCHAEFFER, BC
    TOBIN, FL
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1987, 193 : 2 - COMP
  • [26] INFORMATION-FLOW THEORY OF COMMUNITY INFLUENCE
    ORBELL, JM
    [J]. JOURNAL OF POLITICS, 1970, 32 (02): : 322 - 338
  • [27] OPENING THE FLOODGATE TO CHEMICAL INFORMATION-FLOW
    GREEN, MR
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1983, 185 (MAR): : 85 - ANYL
  • [28] Generalizing parametricity using information-flow
    Washburn, G
    Weirich, S
    [J]. LICS 2005: 20th Annual IEEE Symposium on Logic in Computer Science - Proceedings, 2005, : 62 - 71
  • [29] AN INFORMATION-FLOW TECHNIQUE IN ERP APPLICATION
    KUSHWAHA, R
    WILLIAMS, WJ
    SHEVRIN, H
    SACKELLARES, C
    [J]. IMAGES OF THE TWENTY-FIRST CENTURY, PTS 1-6, 1989, 11 : 715 - 716
  • [30] ONLINE COMPUTER SMOOTHS INFORMATION-FLOW
    不详
    [J]. INFOSYSTEMS, 1981, 28 (08): : 76 - 76