Show simple item record

dc.contributor.authorMoore, Scott David
dc.contributor.authorAskarov, Aslan
dc.contributor.authorChong, Stephen N
dc.date.accessioned2014-09-02T13:27:46Z
dc.date.issued2012
dc.identifier.citationMoore, Scott, Aslan Askarov, and Stephen Chong. 2012. Precise Enforcement of Progress-Sensitive Security. In Proceedings of the 2012 ACM Conference on Computer and Communications Security - CCS '12, 881-893. New York: ACM Press.en_US
dc.identifier.isbn978-1-4503-1651-4en_US
dc.identifier.isbn1450316514en_US
dc.identifier.urihttp://nrs.harvard.edu/urn-3:HUL.InstRepos:12763608
dc.description.abstractProgram progress (or termination) is a covert channel that may leak sensitive information. To control information leakage on this channel, semantic definitions of security should be progress sensitive and enforcement mechanisms should restrict the channel's capacity. However, most state-of-the-art language-based information-flow mechanisms are progress insensitive---allowing arbitrary information leakage through this channel---and current progress-sensitive enforcement techniques are overly restrictive. We propose a type system and instrumented semantics that together enforce progress-sensitive security more precisely than existing approaches. Our system is permissive in that it is able to accept programs in which the termination behavior depends only on low-security (e.g., public or trusted) information. Our system is parameterized on a termination oracle, and controls the progress channel precisely, modulo the ability of the oracle to determine the termination behavior of a program based on low-security information. We have instantiated the oracle for a simple imperative language with a logical abstract interpretation that uses an SMT solver to synthesize linear rank functions. In addition, we extend the system to permit controlled leakage through the progress channel, with the leakage bound by an explicit budget. We empirically analyze progress channels in existing Jif code. Our evaluation suggests that security-critical programs appear to satisfy progress-sensitive security.en_US
dc.description.sponsorshipEngineering and Applied Sciencesen_US
dc.language.isoen_USen_US
dc.publisherACM Pressen_US
dc.relation.isversionofdoi:10.1145/2382196.2382289en_US
dc.relation.hasversionhttp://askarov.net/ccs12.pdfen_US
dash.licenseLAA
dc.subjectTermination channelsen_US
dc.subjectprogress channelsen_US
dc.subjectinformation flowen_US
dc.titlePrecise Enforcement of Progress-Sensitive Securityen_US
dc.typeConference Paperen_US
dc.description.versionAccepted Manuscripten_US
dash.depositing.authorChong, Stephen N
dash.waiver2012-04-08
dc.date.available2014-09-02T13:27:46Z
dc.relation.bookProceedings of the 2012 ACM Conference on Computer and Communications Security - CCS '12en_US
dc.identifier.doi10.1145/2382196.2382289*
dash.contributor.affiliatedAskarov, Aslan
dash.contributor.affiliatedMoore, Scott David
dash.contributor.affiliatedChong, Stephen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record