2012 IEEE 25th Computer Security Foundations Symposium 2012
DOI: 10.1109/csf.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

Securing Interactive Programs

Abstract: This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must always be ready to feed new inputs into programs. However, programs secure under this assumption can leak the presence of input. Such leaks can be magnified to whole-secret leaks in the concurrent setting. We propose a framework that generalizes previous research along two dimensions: first, the framework breaks away from the totality of the environm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(40 citation statements)
references
References 32 publications
1
39
0
Order By: Relevance
“…The enforcement mechanism of Boudol [10], is, similarly to our approach, parametrized over a class of terminating programs, but unlike our work, it does not take runtime information into account; moreover, nonterminating programs are ruled out. Type systems of [48,11,41] enforce progress-sensitivity by permitting high loops but disallowing public side effects after that; this is similar to what one achieves in our language without cast command.…”
Section: Progress (In)sensitivitymentioning
confidence: 56%
“…The enforcement mechanism of Boudol [10], is, similarly to our approach, parametrized over a class of terminating programs, but unlike our work, it does not take runtime information into account; moreover, nonterminating programs are ruled out. Type systems of [48,11,41] enforce progress-sensitivity by permitting high loops but disallowing public side effects after that; this is similar to what one achieves in our language without cast command.…”
Section: Progress (In)sensitivitymentioning
confidence: 56%
“…An LTS p produces t under ω, written ω |= p t − → if ω is consistent with t and p t − →. Again, this definition of strategies is a generalization of the previous work in [3].…”
Section: Definition 1 (Strategy)mentioning
confidence: 95%
“…Our framework is an extension of the framework by Rafnsson et al [3]. Our notion of declassification has as a consequence that non-interference in presence of deterministic environments is weaker than non-interference in general.…”
Section: A Contributionmentioning
confidence: 99%
See 2 more Smart Citations