Timed abstract non-interference

被引:0
|
作者
Giacobazzi, R [1 ]
Mastroeni, I
机构
[1] Univ Verona, Dipartimento Informat, I-37100 Verona, Italy
[2] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
关键词
abstract interpretation; security; non-interference; timing channels;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we introduce a timed notion of abstract non-interference. This is obtained by considering semantics which observe time elapsed in computations. Timing channels can be modeled in this way either by letting the attacker to observe time as a public variable or reckon the time elapsed by observing the computational traces' length, corresponding to observe the program counter. In the first case abstract non-interference provides a model for abstracting the information about time, namely we can for example consider models of attackers that can observe only intervals of time, or other more abstract properties. In the second case abstract non-interference provides a model for attackers able to observe properties of trace length, e.g., the public memory during the whole computation. We investigate when adding the observation of time does not increase the attacker's power in disclosing confidential information about data. This models the absence of timing channels in language-based security.
引用
收藏
页码:289 / 303
页数:15
相关论文
共 50 条
  • [41] A survey on non-interference with Petri nets
    Busi, N
    Gorrieri, R
    LECTURES ON CONCURRENCY AND PETRI NETS: ADVANCES IN PETRI NETS, 2004, 3098 : 328 - 344
  • [42] A typed assembly language for non-interference
    Medel, R
    Compagnoni, A
    Bonelli, E
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2005, 3701 : 360 - 374
  • [43] Non-interference models and subliminal channels
    Grusho, A.A.
    Shumitskaya, E.L.
    Discrete Mathematics and Applications, 2002, 12 (01): : 9 - 14
  • [44] Class-level Non-Interference
    Zanardini, Damiano
    NEW GENERATION COMPUTING, 2012, 30 (2-3) : 241 - 270
  • [45] Non-interference in Partial Order Models
    Berard, Beatrice
    Helouet, Loic
    Mullins, John
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [46] The Myth of Academics' Non-interference in Legislatures
    Zelizer, Adam
    POLITICAL STUDIES REVIEW, 2022, 20 (02) : 228 - 235
  • [47] China Debates the Non-Interference Principle
    Zheng, Chen
    CHINESE JOURNAL OF INTERNATIONAL POLITICS, 2016, 9 (03): : 349 - 374
  • [48] Non-Interference for Deterministic Interactive Programs
    Clark, David
    Hunt, Sebastian
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 50 - +
  • [49] Class-level Non-Interference
    Damiano Zanardini
    New Generation Computing, 2012, 30 : 241 - 270
  • [50] Intransitive non-interference for cryptographic purposes
    Backes, M
    Pfitzmann, B
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 140 - 152