Hybrid Monitors for Concurrent Noninterference

被引:17
|
作者
Askarov, Aslan [1 ]
Chong, Stephen [2 ]
Mantel, Heiko [3 ]
机构
[1] Aarhus Univ, DK-8000 Aarhus C, Denmark
[2] Harvard Univ, Cambridge, MA 02138 USA
[3] Tech Univ Darmstadt, Darmstadt, Germany
关键词
Language-based security; information-flow control for concurrent systems; hybrid information-flow monitor;
D O I
10.1109/CSF.2015.17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controlling confidential information in concurrent systems is difficult, due to covert channels resulting from interaction between threads. This problem is exacerbated if threads share resources at fine granularity. In this work, we propose a novel monitoring framework to enforce strong information security in concurrent programs. Our monitors are hybrid, combining dynamic and static program analysis to enforce security in a sound and rather precise fashion. In our framework, each thread is guarded by its own local monitor, and there is a single global monitor. We instantiate our monitoring framework to support rely-guarantee style reasoning about the use of shared resources, at the granularity of individual memory locations, and then specialize local monitors further to enforce flow-sensitive progress-sensitive information-flow control. Our local monitors exploit rely-guarantee-style reasoning about shared memory to achieve high precision. Soundness of rely-guarantee-style reasoning is guaranteed by all monitors cooperatively. The global monitor is invoked only when threads synchronize, and so does not needlessly restrict concurrency. We prove that our hybrid monitoring approach enforces a knowledge-based progress-sensitive noninterference security condition.
引用
收藏
页码:137 / 151
页数:15
相关论文
共 50 条
  • [31] What is intransitive noninterference?
    Roscoe, A.W.
    Goldsmith, M.H.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 228 - 238
  • [32] Testing noninterference, quickly
    Hritcu, Catalin
    Lampropoulos, Leonidas
    Spector-Zabusky, Antal
    De Amorim, Arthur Azevedo
    Denes, Maxime
    Hughes, John
    Pierce, Benjamin C.
    Vytiniotis, Dimitrios
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2016, 26
  • [33] Noninterference model for integrity
    Zhang, Fan
    Chen, Shu
    Sang, Yong-Xuan
    You, Lin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 78 - 85
  • [34] PROCESSES, TASKS, AND MONITORS - A COMPARATIVE-STUDY OF CONCURRENT PROGRAMMING PRIMITIVES
    WEGNER, P
    SMOLKA, SA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (04) : 446 - 462
  • [35] Noninterference and intrusion detection
    Ko, C
    Redmond, T
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 177 - 187
  • [36] Polymorphic Relaxed Noninterference
    Cruz, Raimil
    Tanter, Eric
    2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 101 - 113
  • [37] THREAD ALGEBRA FOR NONINTERFERENCE
    Vu, Thuy Duong
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2009, 43 (02): : 249 - 268
  • [38] Computational probabilistic noninterference
    Michael Backes
    Birgit Pfitzmann
    International Journal of Information Security, 2004, 3 (1) : 42 - 60
  • [39] Hybrid Concurrent Learning for Hybrid Linear Regression
    Johnson, Ryan S.
    Sanfelice, Ricardo G.
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 3256 - 3261
  • [40] A comparison of semantic models for noninterference
    van der Meyden, Ron
    Zhang, Chenyi
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 235 - +