Secure Information Flow for Concurrent Programs under Total Store Order

被引:8
|
作者
Vaughan, Jeffrey A. [1 ]
Millstein, Todd [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
关键词
information flow; language-based security; weak memory models; MEMORY; MODELS;
D O I
10.1109/CSF.2012.20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern multicore hardware and multithreaded programming languages expose weak memory models to programmers, which relax the intuitive sequential consistency (SC) memory model in order to support a variety of hardware and compiler optimizations. However, to our knowledge all prior work on secure information flow in a concurrent setting has assumed SC semantics. This paper investigates the impact of the Total Store Order (TSO) memory model, which is used by Intel x86 and Sun SPARC processors, on secure information flow, focusing on the natural security condition known as possibilistic noninterference. We show that possibilistic noninterference under SC and TSO are incomparable notions; neither property implies the other one. We define a simple type system for possibilistic noninterference under SC and demonstrate that it is unsound under TSO. We then provide two variants of this type system that are sound under TSO: one that requires only a small change to the original type system but is overly restrictive, and another that incorporates a form of flow sensitivity to safely retain additional expressiveness. Finally, we show that the original type system is in fact sound under TSO for programs that are free of data races.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 50 条
  • [1] Concrete and abstract semantics to check secure information flow in concurrent programs
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    [J]. FUNDAMENTA INFORMATICAE, 2004, 60 (1-4) : 81 - 98
  • [2] Secure information flow for a concurrent language with scheduling
    Barthe, Gilles
    Nieto, Leonor
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 647 - 689
  • [3] Compositional information flow security for concurrent programs
    Bossi, Annalisa
    Piazza, Carla
    Rossi, Sabina
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (03) : 373 - 416
  • [4] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    [J]. COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
  • [5] An Automated Quantitative Information Flow Analysis for Concurrent Programs
    Khayyam, Salehi
    Noroozi, Ali A.
    Amir-Mohammadian, Sepehr
    Mohagheghi, Mohammadsadegh
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2022), 2022, 13479 : 43 - 63
  • [6] A per model of secure information flow in sequential programs
    Sabelfeld, A
    Sands, D
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 1999, 1576 : 40 - 58
  • [7] Backwards-directed information flow analysis for concurrent programs
    Winter, Kirsten
    Coughlin, Nicholas
    Smith, Graeme
    [J]. 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 33 - 48
  • [8] IN-STORE NUTRITION INFORMATION PROGRAMS
    PENNINGTON, JAT
    WISNIOWSKI, LA
    LOGAN, GB
    [J]. JOURNAL OF NUTRITION EDUCATION, 1988, 20 (01): : 5 - 10
  • [9] Bisimulation for Secure Information Flow Analysis of Multi-Threaded Programs
    Noroozi, Ali A.
    Karimpour, Jaber
    Isazadeh, Ayaz
    [J]. MATHEMATICAL AND COMPUTATIONAL APPLICATIONS, 2019, 24 (02)
  • [10] Abstract interpretation and model checking for checking secure information flow in concurrent systems
    De Francesco, N
    Santone, A
    Tesei, L
    [J]. FUNDAMENTA INFORMATICAE, 2003, 54 (2-3) : 195 - 211