Noninterference specifications for secure systems

被引:3
|
作者
Nelson L. [1 ]
Bornholt J. [2 ]
Krishnamurthy A. [1 ]
Torlak E. [1 ]
Wang X. [1 ]
机构
[1] University of Texas, Austin
来源
Operating Systems Review (ACM) | 2020年 / 54卷 / 01期
基金
美国国家科学基金会;
关键词
D O I
10.1145/3421473.3421478
中图分类号
学科分类号
摘要
This paper presents an analysis of noninterference specifications used in a range of formally verified systems. The main findings are that these systems use distinct specifications and that they often employ small variations, both complicating their security implications. We categorize these specifications and discuss their trade-offs for reasoning about information flows in systems. © 2020 Copyright is held by the owner/author(s).
引用
收藏
页码:31 / 39
页数:8
相关论文
共 50 条
  • [1] Noninterference Through Secure Multi-Execution
    Devriese, Dominique
    Piessens, Frank
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 109 - 124
  • [2] Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications
    Juerjens, Jan
    Ochoa, Martin
    Schmidt, Holger
    Marchal, Loic
    Houmb, Siv Hilde
    Islam, Shareeful
    FORMAL METHODS FOR ETERNAL NETWORKED SOFTWARE SYSTEMS, SFM 2011, 2011, 6659 : 504 - 526
  • [3] Noninterference equations for nondeterministic systems
    Pinsky, S
    Zieglar, E
    14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 3 - 14
  • [4] Noninterference for concurrent programs and thread systems
    Boudol, G
    Castellani, I
    THEORETICAL COMPUTER SCIENCE, 2002, 281 (1-2) : 109 - 130
  • [5] Electronic passports - from secure specifications to secure implementations
    Liersch, Ingo
    Information Security Technical Report, 2009, 14 (02): : 96 - 100
  • [6] Enforcing Generalized Refinement-based Noninterference for Secure Interface Composition
    Sun, Cong
    Xi, Ning
    Ma, Jianfeng
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 586 - 595
  • [7] Noninterference Analysis of Reversible Probabilistic Systems
    Esposito, Andrea
    Aldini, Alessandro
    Bernardo, Marco
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2024, 2024, 14678 : 39 - 59
  • [8] Secure Enforcement for Global Process Specifications
    Planul, Jeremy
    Corin, Ricardo
    Fournet, Cedric
    CONCUR 2009 - CONCURRENCY THEORY, PROCEEDINGS, 2009, 5710 : 511 - 526
  • [9] Authentication primitives for secure protocol specifications
    Bodei, C
    Degano, P
    Focardi, R
    Priami, C
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (05): : 645 - 653
  • [10] A noninterference trusted dual system security guarantee method based on secure memory
    Hong, Yu
    Li, Yi
    Tan, Haining
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (02):