2016
DOI: 10.3233/jcs-15784
|View full text |Cite
|
Sign up to set email alerts
|

A verified information-flow architecture

Abstract: SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for tracking and limiting information flows. At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed. The operating system virtualizes these generic facilities to present an information-flow abstract machine that allows user programs to label sensitive data with rich confidentiality policies. We present a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(32 citation statements)
references
References 93 publications
0
32
0
Order By: Relevance
“…This assumption ensures that, at the level of abstraction we consider here, allocations in high contexts cannot influence the values of pointers allocated in low contexts, and we can thus use syntactic equality to check indistinguishability of pointers. While this assumption on allocation might seem unrealistic, previous work has shown formally that because block identifiers are opaque, this machine can be realized by a lower-level machine with a single standard allocator (Azevedo de Amorim et al 2014). …”
Section: Per-level Allocation Stamps Reachability and Noninterferencementioning
confidence: 99%
See 4 more Smart Citations
“…This assumption ensures that, at the level of abstraction we consider here, allocations in high contexts cannot influence the values of pointers allocated in low contexts, and we can thus use syntactic equality to check indistinguishability of pointers. While this assumption on allocation might seem unrealistic, previous work has shown formally that because block identifiers are opaque, this machine can be realized by a lower-level machine with a single standard allocator (Azevedo de Amorim et al 2014). …”
Section: Per-level Allocation Stamps Reachability and Noninterferencementioning
confidence: 99%
“…We define what it means for this basic IFC machine to be "secure" using a standard notion of termination-insensitive noninterference (Austin and Flanagan 2009;Azevedo de Amorim et al 2014;Hriţcu et al 2013a;Sabelfeld and Myers 2003); we call it end-to-end noninterference (or EENI) to distinguish it from the stronger notions we will introduce in §6. The main idea of EENI is to directly encode the intuition that secret inputs should not influence public outputs.…”
Section: Noninterference (Eeni)mentioning
confidence: 99%
See 3 more Smart Citations