Secure information flow via linear continuations

被引:30
|
作者
Zdancewic, Steve [1 ]
Myers, Andrew C. [1 ]
机构
[1] Department of Computer Science, Cornell University, Ithaca, NY 14853, United States
关键词
Information analysis - Program compilers - Security of data - Semantics;
D O I
10.1023/A:1020843229247
中图分类号
学科分类号
摘要
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages enforce noninterference and as a first step towards understanding their compilation. We present a low-level, secure calculus with higher-order, imperative features and linear continuations. Linear continuations impose a stack discipline on the control flow of programs. This additional structure in the type system lets us establish a strong information-flow security property called noninterference. We prove that our CPS target language enjoys the noninterference property and we show how to translate secure high-level programs to this low-level language. This noninterference proof is the first of its kind for a language with higher-order functions and state.
引用
收藏
页码:209 / 234
相关论文
共 50 条
  • [41] A uniform type structure for secure information flow
    Honda, Kohei
    Yoshida, Nobuko
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2007, 29 (06):
  • [42] Engineering Policies for Secure Interorganizational Information Flow
    Kunz, Steffen
    Fabian, Benjamin
    Marx, Daniel
    Mueller, Sebastian
    2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, : 438 - 447
  • [43] Secure Refactoring with Java']Java Information Flow
    Helke, Steffen
    Kammuller, Florian
    Probst, Christian W.
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 264 - 272
  • [44] Effect handlers via generalised continuations
    Hillerstrom, Daniel
    Lindley, Sam
    Atkey, Robert
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2020, 30
  • [45] Semantics and program analysis of computationally secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 77 - 91
  • [46] Java']Java bytecode verification for secure information flow
    Avvenuti, M
    Bernardeschi, C
    De Francesco, N
    ACM SIGPLAN NOTICES, 2003, 38 (12) : 20 - 27
  • [47] Typing access control and secure information flow in sessions
    Capecchi, Sara
    Castellani, Ilaria
    Dezani-Ciancaglini, Mariangiola
    INFORMATION AND COMPUTATION, 2014, 238 : 68 - 105
  • [48] Formal verification of secure information flow in cloud computing
    Zeng, Wen
    Koutny, Maciej
    Watson, Paul
    Germanos, Vasileios
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 27-28 : 103 - 116
  • [49] SpecVerilog: Adapting Information Flow Control for Secure Speculation
    Zagieboylo, Drew
    Sherk, Charles
    Myers, Andrew C.
    Suh, G. Edward
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2068 - 2082
  • [50] Information flow analysis for fail-secure devices
    Rae, A. (arae@itee.uq.edu.au), 1600, Oxford University Press (48):