Secure information flow via linear continuations

被引:30
|
作者
Zdancewic, Steve [1 ]
Myers, Andrew C. [1 ]
机构
[1] Department of Computer Science, Cornell University, Ithaca, NY 14853, United States
关键词
Information analysis - Program compilers - Security of data - Semantics;
D O I
10.1023/A:1020843229247
中图分类号
学科分类号
摘要
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages enforce noninterference and as a first step towards understanding their compilation. We present a low-level, secure calculus with higher-order, imperative features and linear continuations. Linear continuations impose a stack discipline on the control flow of programs. This additional structure in the type system lets us establish a strong information-flow security property called noninterference. We prove that our CPS target language enjoys the noninterference property and we show how to translate secure high-level programs to this low-level language. This noninterference proof is the first of its kind for a language with higher-order functions and state.
引用
收藏
页码:209 / 234
相关论文
共 50 条
  • [1] Quantitative analysis of secure information flow via Probabilistic Semantics
    Mu, Chunyan
    Clark, David
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 49 - 57
  • [2] Secure program execution via dynamic information flow tracking
    Suh, GE
    Lee, JW
    Zhang, D
    Devadas, S
    ACM SIGPLAN NOTICES, 2004, 39 (11) : 85 - 96
  • [3] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [4] Arrows for secure information flow
    Li, Peng
    Zdancewic, Steve
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994
  • [5] Information flow in secure contexts
    Bossi, Annalisa
    Macedonio, Damiano
    Piazza, Carla
    Rossi, Sabina
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
  • [6] Information Flow Secure CAmkES
    Goyal, Amit
    Garg, Akshat
    Gour, Digvijaysingh
    Shyamasundar, R. K.
    Sivakumar, G.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
  • [7] Secure information flow and CPS
    Zdancewic, S
    Myers, AC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
  • [8] Compositionality of Secure Information Flow
    Palamidessi, Catuscia
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
  • [9] PROGRAMS WITH CONTINUATIONS AND LINEAR LOGIC
    NISHIZAKI, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 526 : 513 - 531
  • [10] PROGRAMS WITH CONTINUATIONS AND LINEAR LOGIC
    NISHIZAKI, S
    SCIENCE OF COMPUTER PROGRAMMING, 1993, 21 (02) : 165 - 190