Compositional Information-flow Security for Interactive Systems

被引:5
|
作者
Rafnsson, Willard [1 ]
Sabelfeld, Andrei [1 ]
机构
[1] Chalmers Univ Technol, Gothenburg, Sweden
关键词
NONINTERFERENCE;
D O I
10.1109/CSF.2014.27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To achieve end-to-end security in a system built from parts, it is important to ensure that the composition of secure components is itself secure. This work investigates the compositionality of two popular conditions of possibilistic noninterference. The first condition, progress-insensitive noninterference (PINI), is the security condition enforced by practical tools like JSFlow, Paragon, sequential LIO, Jif, FlowCaml, and SPARK Examiner. We show that this condition is not preserved under fair parallel composition: composing a PINI system fairly with another PINI system can yield an insecure system. We explore constraints that allow recovering compositionality for PINI. Further, we develop a theory of compositional reasoning. In contrast to PINI, we show what PSNI behaves well under composition, with and without fairness assumptions. Our work is performed within a general framework for nondeterministic interactive systems.
引用
收藏
页码:277 / 292
页数:16
相关论文
共 50 条
  • [1] OWL: Compositional Verification of Security Protocols via an Information-Flow Type System
    Gancher, Joshua
    Gibson, Sydney
    Singh, Pratap
    Dharanikota, Samvid
    Parno, Bryan
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1130 - 1147
  • [2] Information flow security for interactive systems
    Jin, Y
    Liu, L
    Zheng, XJ
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 1045 - 1054
  • [3] SECURITY INFORMATION-FLOW IN MULTIDIMENSIONAL ARRAYS
    KRAMER, SM
    SIDHU, DP
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1983, 32 (12) : 1188 - 1191
  • [4] Information-Flow Security for a Core of Java']JavaScript
    Hedin, Daniel
    Sabelfeld, Andrei
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 3 - 18
  • [5] Language-based information-flow security
    Sabelfeld, A
    Myers, AC
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 5 - 19
  • [6] INTERACTION OF INFORMATION-FLOW WITH CM SYSTEMS
    BHANDARI, N
    [J]. JOURNAL OF THE CONSTRUCTION DIVISION-ASCE, 1978, 104 (03): : 261 - 268
  • [7] INFORMATION-FLOW IN MODULAR FLOWSHEETING SYSTEMS
    METCALFE, SR
    PERKINS, JD
    [J]. TRANSACTIONS OF THE INSTITUTION OF CHEMICAL ENGINEERS, 1978, 56 (03): : 210 - 213
  • [8] STRUCTURING AN INFORMATION-FLOW FOR AUTONOMOUS SYSTEMS
    SZCZERBICKI, E
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1991, 22 (12) : 2599 - 2609
  • [9] Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems
    Howser, Gerry
    McMillin, Bruce
    [J]. COMPUTER, 2017, 50 (04) : 17 - 26
  • [10] SYSTEMS AND PROCEDURES OF PATIENTS AND INFORMATION-FLOW
    REISMAN, A
    DASILVA, JM
    MANTELL, JB
    [J]. HOSPITAL & HEALTH SERVICES ADMINISTRATION, 1978, 23 (01): : 42 - 71