Arrows for secure information flow

被引:28
|
作者
Li, Peng [1 ]
Zdancewic, Steve [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
关键词
Information flow; Security; Haskell; Arrows; Type systems; Combinators;
D O I
10.1016/j.tcs.2010.01.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, lowers the threshold for adopting security-typed languages, and also provides great flexibility and modularity for using security-policy frameworks. The embedded security sublanguage is designed using a standard combinator interface called arrows. Computations constructed in the sublanguage have static and explicit control-flow components, making it possible to implement information-flow control using static-analysis techniques at run time, while providing strong security guarantees. This paper presents a formal proof that our embedded sublanguage provides noninterference, a concrete Haskell implementation and an example application demonstrating the proposed techniques.(1) (c) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1974 / 1994
页数:21
相关论文
共 50 条
  • [1] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [2] Information flow in secure contexts
    Bossi, Annalisa
    Macedonio, Damiano
    Piazza, Carla
    Rossi, Sabina
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
  • [3] Information Flow Secure CAmkES
    Goyal, Amit
    Garg, Akshat
    Gour, Digvijaysingh
    Shyamasundar, R. K.
    Sivakumar, G.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
  • [4] Secure information flow and CPS
    Zdancewic, S
    Myers, AC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
  • [5] Compositionality of Secure Information Flow
    Palamidessi, Catuscia
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
  • [6] Principles of secure information flow analysis
    Smith, Geoffrey
    Malware Detection, 2007, : 291 - 307
  • [7] Array operations for secure information flow
    Yao, JB
    Li, JS
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3884 - 3892
  • [8] Secure Information Flow as a Safety Property
    Boudol, Gerard
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 20 - 34
  • [9] Secure Information Flow for Distributed Systems
    Alpizar, Rafael
    Smith, Geoffrey
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 126 - 140
  • [10] SPLinux*: An Information Flow Secure Linux
    Vyas, Parjanya
    Shyamasundar, Rk
    Patil, Bhagyesh
    Borse, Snehal
    Sen, Satyaki
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1603 - 1612