DocumentCode :
2947541
Title :
Secure Information Flow for Concurrent Programs under Total Store Order
Author :
Vaughan, J.A. ; Millstein, Todd
Author_Institution :
Univ. of California Los Angeles, Los Angeles, CA, USA
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
19
Lastpage :
29
Abstract :
Modern multicore hardware and multithreaded programming languages expose weak memory models to programmers, which relax the intuitive sequential consistency (SC) memory model in order to support a variety of hardware and compiler optimizations. However, to our knowledge all prior work on secure information flow in a concurrent setting has assumed SC semantics. This paper investigates the impact of the Total Store Order (TSO) memory model, which is used by Intel x86 and Sun SPARC processors, on secure information flow, focusing on the natural security condition known as possibilistic noninterference. We show that possibilistic noninterference under SC and TSO are incomparable notions, neither property implies the other one. We define a simple type system for possibilistic noninterference under SC and demonstrate that it is unsound under TSO. We then provide two variants of this type system that are sound under TSO: one that requires only a small change to the original type system but is overly restrictive, and another that incorporates a form of flow sensitivity to safely retain additional expressiveness. Finally, we show that the original type system is in fact sound under TSO for programs that are free of data races.
Keywords :
multi-threading; optimising compilers; security of data; shared memory systems; Intel x86 processor; SC semantics; Sun SPARC processor; TSO memory model; compiler optimizations; concurrent programs; flow sensitivity; information flow security; intuitive sequential consistency memory model; multicore hardware; multithreaded programming languages; possibilistic noninterference; total store order memory model; weak memory models; Buffer storage; Hardware; Instruction sets; Security; Semantics; Synchronization; information flow; language-based security; weak memory models;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
Conference_Location :
Cambridge, MA
ISSN :
1940-1434
Print_ISBN :
978-1-4673-1918-8
Electronic_ISBN :
1940-1434
Type :
conf
DOI :
10.1109/CSF.2012.20
Filename :
6266149
Link To Document :
بازگشت