2012
DOI: 10.1016/j.cose.2011.10.002
|View full text |Cite
|
Sign up to set email alerts
|

On-the-fly inlining of dynamic security monitors

Abstract: Abstract. Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that inclu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…The inlined code manipulates shadow variables to keep track of the security labels of the program's variables. Inlining information-flow security monitors have been explored for simple languages [9], [14], [39] without the heap. This approach has been pushed in the direction of JavaScript [48] targeting a large language subset including the scope chain, the heap and prototypical inheritance as well as closures.…”
Section: Related Workmentioning
confidence: 99%
“…The inlined code manipulates shadow variables to keep track of the security labels of the program's variables. Inlining information-flow security monitors have been explored for simple languages [9], [14], [39] without the heap. This approach has been pushed in the direction of JavaScript [48] targeting a large language subset including the scope chain, the heap and prototypical inheritance as well as closures.…”
Section: Related Workmentioning
confidence: 99%
“…We assume that a monitor based on security levels (for example, a purely dynamic monitor), is inlined in the program following the inlining technique simultaneously proposed by Chudnov and Naumann [10] and Russo and Sabelfeld [19]. Here, a program c is transformed into a program c, where each variable x has a shadow variable x representing the security label of x.…”
Section: A Hybrid Monitor Reusing An Inlined Monitormentioning
confidence: 99%
“…Magazinius et al [18] investigate sound inlining of security monitors for an imperative language supporting dynamic code evaluation but no references. Their monitor is purely dynamic since it uses a no-sensitive upgrade policy as in Austin and Flanagan [11].…”
Section: Related Workmentioning
confidence: 99%