2015
DOI: 10.1007/978-3-319-24858-5_13
|View full text |Cite
|
Sign up to set email alerts
|

It’s My Privilege: Controlling Downgrading in DC-Labels

Abstract: Abstract. Disjunction Category Labels (DC-labels) are an expressive label format used to classify the sensitivity of data in information-flow control systems. DC-labels use capability-like privileges to downgrade information. Inappropriate use of privileges can compromise security, but DC-labels provide no mechanism to ensure appropriate use. We extend DC-labels with the novel notions of bounded privileges and robust privileges. Bounded privileges specify and enforce upper and lower bounds on the labels of dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…As in Zeldovich et al (2006), this addresses attacks in which malicious code duplicates sensitive data, e.g., by copying a file, only to read it later, when the system policy changes (e.g., in λChair, promoting a member to a co-chair and granting them the corresponding privileges). While, within a single run, LIO programs can use robust declassification as in , Waye et al (2015) to reason about policy changes, without clearance, reasoning about the consequence of a system policy change across multiple program runs is more difficult. We refer the interested reader to Zeldovich et al (2006) for a more detailed consideration of this use case.…”
Section: Restricting Data-access With Clearancementioning
confidence: 99%
“…As in Zeldovich et al (2006), this addresses attacks in which malicious code duplicates sensitive data, e.g., by copying a file, only to read it later, when the system policy changes (e.g., in λChair, promoting a member to a co-chair and granting them the corresponding privileges). While, within a single run, LIO programs can use robust declassification as in , Waye et al (2015) to reason about policy changes, without clearance, reasoning about the consequence of a system policy change across multiple program runs is more difficult. We refer the interested reader to Zeldovich et al (2006) for a more detailed consideration of this use case.…”
Section: Restricting Data-access With Clearancementioning
confidence: 99%
“…These examples use the notation of the flow-limited authorization model (FLAM) [4], which offers an expressive way to state both information flow restrictions and authorization policies. However, the problems observed in these examples are not specific to FLAM; they arise in all previous information-flow models that support downgrading (e.g., [8,15,21,25,32,42,47]). The approach in this paper can be applied straightforwardly to the decentralized label model (DLM) [25], and with more effort, to DIFC models that are less similar to FLAM.…”
Section: Motivationmentioning
confidence: 96%
“…One candidate approach is the work by Dimoulas et al [17] that uses access control and integrity policies to restrict capability use. Another is the mechanism of bounded privileges for LIO proposed by Waye et al [33].…”
Section: Timing Sensitivitymentioning
confidence: 99%