19th IEEE Computer Security Foundations Workshop (CSFW'06)
DOI: 10.1109/csfw.2006.16
|View full text |Cite
|
Sign up to set email alerts
|

Information-Flow Security for Interactive Programs

Abstract: Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about their information-flow security, yet no such models seem to exist for imperative programming languages. Further, existing language-based security conditions founded on noninteractive models permit insecure information flows in interactive imperative programs. This paper formulates new strategybased information-flow security conditions for a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
116
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(116 citation statements)
references
References 35 publications
0
116
0
Order By: Relevance
“…Combining this with a particular input strategy (sometimes referred to as a policy, or adversary in the context of Markov decision processes) induces a discrete-time Markov chain equivalent to the one defined by our semantics above. Our use of input strategies is similar to that of O'Neill et al [18], who define a language with non-probabilistic user strategies and adapt Volpano et al's [4] information leakage type system to support these user strategies.…”
Section: External Inputs To a Programmentioning
confidence: 99%
See 2 more Smart Citations
“…Combining this with a particular input strategy (sometimes referred to as a policy, or adversary in the context of Markov decision processes) induces a discrete-time Markov chain equivalent to the one defined by our semantics above. Our use of input strategies is similar to that of O'Neill et al [18], who define a language with non-probabilistic user strategies and adapt Volpano et al's [4] information leakage type system to support these user strategies.…”
Section: External Inputs To a Programmentioning
confidence: 99%
“…Alvim et al [17] propose the use of channels with memory and feedback to model an attacker with the ability to influence the distribution on secret values in terminating interactive programs; the attacker in our model does not have this ability, and studies the information leakage from non-terminating programs. Theoretical models of information leakage in non-terminating programs have been proposed before: O'Neill et al [18] propose one such model, but it focuses on protecting the strategies of high-level users of the system rather than the values stored in particular highsecurity variables at specific moments.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Volpano et al [14] introduces an atomic construct with effects similar to our concurrency-control mechanism. O'Neill et al [7] introduces IO channels which can be used to emulate shared memory. Although the above works achieve similar results, they all check confidentiality with a flow-insensitive security type system.…”
Section: Related Workmentioning
confidence: 99%
“…For simplicity, we will identify security levels with channels, thus for each a ∈ L, we assume exactly one channel, also named a, which carries data at level a (c.f. [OCC06]). …”
Section: Erasure In the Presence Of Input-outputmentioning
confidence: 99%