Proceedings of the Third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security 2008
DOI: 10.1145/1375696.1375711
|View full text |Cite
|
Sign up to set email alerts
|

Information flow security of multi-threaded distributed programs

Abstract: We study noninterference in the setting of multi-threaded distributed programs in which threads share local memories and multi-threaded processes communicate over an insecure network using encryption primitives to secure messages. We extend a simple imperative language with cryptographic operations which are modelled as special expressions respecting the Dolev-Yao assumptions. Then, we adapt to our setting the notion of patterns proposed by Abadi and Rogaway for modelling the equivalence of cryptographic expre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 22 publications
0
13
0
Order By: Relevance
“…This will allow us to analyse more accurate representations of functions in widely used security APIs such as PKCS #11 [20]. Adding conditionals will require a modified definition of the indistinguishability of stores, similar to the one given by Focardi and Centenaro [14]. It should be noted that such a change will not affect our results for the indistinguishability of expressions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This will allow us to analyse more accurate representations of functions in widely used security APIs such as PKCS #11 [20]. Adding conditionals will require a modified definition of the indistinguishability of stores, similar to the one given by Focardi and Centenaro [14]. It should be noted that such a change will not affect our results for the indistinguishability of expressions.…”
Section: Discussionmentioning
confidence: 99%
“…Focardi and Centenaro [14] give a type system for enforcing non-interference in multi-threaded distributed programs which share common memory locations. They use confounders (unique values associated with each new ciphertext) as an abstraction of probabilistic encryption, and give a definition of equivalence for low security values based on the notion of patterns [10].…”
Section: Related Workmentioning
confidence: 99%
“…Some of these approaches are, for example, applied to specific programs, e.g., written in VHDL [44], where the analysis of information flow is closely related to the context. Moreover, the secure information flow problem was also handled in different situation, for example with multi-threaded programs [42] or with programs that employ explicit cryptographic operations [3,21].…”
Section: Related Workmentioning
confidence: 99%
“…The proof is based on a new notion of fast simulation, which builds on the work of Baier, Katoen, Hermanns, and Wolf [BKHW05] on strong and weak simulation on discrete and continuous Markov chains. The theorem that stripping is a fast simulation shows that the theory of probabilistic simulation can be applied fruitfully to the secure information flow problem, giving another proof technique in addition to the more common bisimulation-based approach of work like [LV05], [SA06], and [FR08] on languages with cryptography, and [AFG98], [SV98], [Smi03], [ACF06], [FC08] on multi-threaded languages. The recent work [AS09] on secure information flow in a distributed language also makes use of the technique of stripping and fast simulation, although in a non-probabilistic context.…”
Section: Related Work and Conclusionmentioning
confidence: 99%