Nonmalleable Information Flow: Technical Report

نویسندگان

  • Ethan Cecchetti
  • Andrew C. Myers
  • Owen Arden
چکیده

Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system. Unfortunately, it is too restrictive for real systems. Mechanisms for downgrading information are needed to capture real-world security requirements, but downgrading eliminates the strong compositional security guarantees of noninterference. We introduce nonmalleable information flow, a new formal security condition that generalizes noninterference to permit controlled downgrading of both confidentiality and integrity. While previous work on robust declassification prevents adversaries from exploiting the downgrading of confidentiality, our key insight is transparent endorsement, a mechanism for downgrading integrity while defending against adversarial exploitation. Robust declassification appeared to break the duality of confidentiality and integrity by making confidentiality depend on integrity, but transparent endorsement makes integrity depend on confidentiality, restoring this duality. We show how to extend a security-typed programming language with transparent endorsement and prove that this static type system enforces nonmalleable information flow, a new security property that subsumes robust declassification and transparent endorsement. Finally, we describe an implementation of this type system in the context of Flame, a flow-limited authorization plugin for the Glasgow Haskell Compiler.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Power of Choice in Scheduling Parallel Tasks

A malleable parallel task is one that can be executed on any number of processors, with its execution time being a function of the number of processors allotted to it. A nonmalleable parallel task is one that requires a speciic number of processors. Given n independent parallel tasks and m identical processors, we consider the problem of scheduling these tasks to minimize average completion tim...

متن کامل

A Numerical Analysis for the Effect of Slip Velocity and Stenosis Shape on Non-Newtonian Flow of Blood (TECHNICAL NOTE)

The aim of this paper is to study the effect of slip velocity and shape of stenosis on non-Newtonian flow of blood through a stenosed arterial segment. Blood is modeled as Bingham-Plastic fluid in a uniform circular tube with a radially non-symmetric stenosis. The problem is investigated by a joint effort of analytical and numerical techniques. The influence of stenosis shape parameter, slip ve...

متن کامل

1999 Research Engineering Annual Report

Since its founding, NASA has been dedicated to the advancement of aeronautics and space science. The NASA Scientific and Technical Information (STI) Program Office plays a key part in helping NASA maintain this important role. The NASA STI Program Office is operated by Langley Research Center, the lead center for NASA's scientific and technical information. The NASA STI Program Office provides ...

متن کامل

A Study of Cache-Based IP Flow Switching

Meeting the service demands from QoS-based network applications is a very challenging task performed in many high-end routers and switches. This task involves management of resources like bandwidth and memory in network devices. The memory in the form of a very fast cache that instruments wire-speed classification, discrimination, and forwarding of network packets needs to be managed very effec...

متن کامل

Fixation and a 180 Degree View Simplify Ego Motion Estimation

Although moving human observers actively fixate their eyes on points in the world, computer vision algorithms designed for the estimation of structure-from-motion or egomotion typically do not make use of this constraint. The main contribution of this work is to precisely specify the form of the optical flow field for a fixating observer. In particular, we show theoretically that the use of a h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1708.08596  شماره 

صفحات  -

تاریخ انتشار 2017