Secure information flow via linear continuations

被引:30
|
作者
Zdancewic, Steve [1 ]
Myers, Andrew C. [1 ]
机构
[1] Department of Computer Science, Cornell University, Ithaca, NY 14853, United States
关键词
Information analysis - Program compilers - Security of data - Semantics;
D O I
10.1023/A:1020843229247
中图分类号
学科分类号
摘要
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages enforce noninterference and as a first step towards understanding their compilation. We present a low-level, secure calculus with higher-order, imperative features and linear continuations. Linear continuations impose a stack discipline on the control flow of programs. This additional structure in the type system lets us establish a strong information-flow security property called noninterference. We prove that our CPS target language enjoys the noninterference property and we show how to translate secure high-level programs to this low-level language. This noninterference proof is the first of its kind for a language with higher-order functions and state.
引用
收藏
页码:209 / 234
相关论文
共 50 条
  • [31] Dynamic dependency monitoring to secure information flow
    Shroff, Paritosh
    Smith, Scott F.
    Thober, Mark
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 203 - +
  • [32] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
  • [33] Handling encryption in an analysis for secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
  • [34] A Secure Information Flow Architecture for Web Services
    Singaravelu, Lenin
    Wei, Jinpeng
    Pu, Calton
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 182 - 189
  • [35] A uniform type structure for secure information flow
    Honda, K
    Yoshida, N
    ACM SIGPLAN NOTICES, 2002, 37 (01) : 81 - 92
  • [36] Verifying Secure Information Flow in Federated Clouds
    Zeng, Wen
    Koutny, Maciej
    Watson, Paul
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 78 - 85
  • [37] Information Flow Control for Secure Cloud Computing
    Bacon, Jean
    Eyers, David
    Pasquier, Thomas F. J. -M.
    Singh, Jatinder
    Papagiannis, Ioannis
    Pietzuch, Peter
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
  • [38] Secure information flow by self-composition
    Barthe, Gilles
    D'Argenio, Pedro R.
    Rezk, Tamara
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2011, 21 (06) : 1207 - 1252
  • [39] Secure information flow with random assignment and encryption
    School of Computing and Information Sciences, Florida International University, Miami, FL 33199, United States
    Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (33-44):
  • [40] Stream Processing with Secure Information Flow Constraints
    Ray, Indrakshi
    Adaikkalavan, Raman
    Xie, Xing
    Gamble, Rose
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 311 - 329