Arrows for secure information flow

被引:28
|
作者
Li, Peng [1 ]
Zdancewic, Steve [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
关键词
Information flow; Security; Haskell; Arrows; Type systems; Combinators;
D O I
10.1016/j.tcs.2010.01.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, lowers the threshold for adopting security-typed languages, and also provides great flexibility and modularity for using security-policy frameworks. The embedded security sublanguage is designed using a standard combinator interface called arrows. Computations constructed in the sublanguage have static and explicit control-flow components, making it possible to implement information-flow control using static-analysis techniques at run time, while providing strong security guarantees. This paper presents a formal proof that our embedded sublanguage provides noninterference, a concrete Haskell implementation and an example application demonstrating the proposed techniques.(1) (c) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1974 / 1994
页数:21
相关论文
共 50 条
  • [21] Secure information flow by self-composition
    Barthe, G
    D'Argenio, PR
    Rezk, T
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 100 - 114
  • [22] A type system for computationally secure information flow
    Laud, P
    Vene, V
    FUNDAMENTALS OF COMPUTATIONAL THEORY, PROCEEDINGS, 2005, 3623 : 365 - 377
  • [23] A Method of Secure Information Flow Based on Data Flow Analysis
    Yao, Jianbo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 597 - 606
  • [24] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [25] Secure information flow as typed process behaviour
    Honda, K
    Vasconcelos, V
    Yoshida, N
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, 1782 : 180 - 199
  • [26] Dynamic dependency monitoring to secure information flow
    Shroff, Paritosh
    Smith, Scott F.
    Thober, Mark
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 203 - +
  • [27] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
  • [28] Handling encryption in an analysis for secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
  • [29] A Secure Information Flow Architecture for Web Services
    Singaravelu, Lenin
    Wei, Jinpeng
    Pu, Calton
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 182 - 189
  • [30] A uniform type structure for secure information flow
    Honda, K
    Yoshida, N
    ACM SIGPLAN NOTICES, 2002, 37 (01) : 81 - 92