DocumentCode :
2351089
Title :
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Author :
Kashyap, Vineeth ; Wiedermann, B. ; Hardekopf, B.
Author_Institution :
UC Santa Barbara, Santa Barbara, CA, USA
fYear :
2011
fDate :
22-25 May 2011
Firstpage :
413
Lastpage :
428
Abstract :
Secure information flow guarantees the secrecy and integrity of data, preventing an attacker from learning secret information (secrecy) or injecting untrusted information (integrity). Covert channels can be used to subvert these security guarantees, for example, timing and termination channels can, either intentionally or inadvertently, violate these guarantees by modifying the timing or termination behavior of a program based on secret or untrusted data. Attacks using these covert channels have been published and are known to work in practiceâ as techniques to prevent non-covert channels are becoming increasingly practical, covert channels are likely to become even more attractive for attackers to exploit. The goal of this paper is to understand the subtleties of timing and termination-sensitive noninterference, explore the space of possible strategies for enforcing noninterference guarantees, and formalize the exact guarantees that these strategies can enforce. As a result of this effort we create a novel strategy that provides stronger security guarantees than existing work, and we clarify claims in existing work about what guarantees can be made.
Keywords :
security of data; covert channels; secret information; secure information flow; Computational modeling; Lattices; Processor scheduling; Security; Semantics; Sensitivity; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2011 IEEE Symposium on
Conference_Location :
Berkeley, CA
ISSN :
1081-6011
Print_ISBN :
978-1-4577-0147-4
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2011.19
Filename :
5958043
Link To Document :
بازگشت