• DocumentCode
    2947541
  • Title

    Secure Information Flow for Concurrent Programs under Total Store Order

  • Author

    Vaughan, J.A. ; Millstein, Todd

  • Author_Institution
    Univ. of California Los Angeles, Los Angeles, CA, USA
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    19
  • Lastpage
    29
  • Abstract
    Modern multicore hardware and multithreaded programming languages expose weak memory models to programmers, which relax the intuitive sequential consistency (SC) memory model in order to support a variety of hardware and compiler optimizations. However, to our knowledge all prior work on secure information flow in a concurrent setting has assumed SC semantics. This paper investigates the impact of the Total Store Order (TSO) memory model, which is used by Intel x86 and Sun SPARC processors, on secure information flow, focusing on the natural security condition known as possibilistic noninterference. We show that possibilistic noninterference under SC and TSO are incomparable notions, neither property implies the other one. We define a simple type system for possibilistic noninterference under SC and demonstrate that it is unsound under TSO. We then provide two variants of this type system that are sound under TSO: one that requires only a small change to the original type system but is overly restrictive, and another that incorporates a form of flow sensitivity to safely retain additional expressiveness. Finally, we show that the original type system is in fact sound under TSO for programs that are free of data races.
  • Keywords
    multi-threading; optimising compilers; security of data; shared memory systems; Intel x86 processor; SC semantics; Sun SPARC processor; TSO memory model; compiler optimizations; concurrent programs; flow sensitivity; information flow security; intuitive sequential consistency memory model; multicore hardware; multithreaded programming languages; possibilistic noninterference; total store order memory model; weak memory models; Buffer storage; Hardware; Instruction sets; Security; Semantics; Synchronization; information flow; language-based security; weak memory models;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
  • Conference_Location
    Cambridge, MA
  • ISSN
    1940-1434
  • Print_ISBN
    978-1-4673-1918-8
  • Electronic_ISBN
    1940-1434
  • Type

    conf

  • DOI
    10.1109/CSF.2012.20
  • Filename
    6266149