2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.28
|View full text |Cite
|
Sign up to set email alerts
|

Stateful Declassification Policies for Event-Driven Programs

Abstract: We propose a novel mechanism for enforcing information flow policies with support for declassification on event-driven programs. Declassification policies consist of two functions. First, a projection function specifies for each confidential event what information in the event can be declassified directly. This generalizes the traditional security labelling of inputs. Second, a stateful release function specifies the aggregate information about all confidential events seen so far that can be declassified. We p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 38 publications
0
19
0
Order By: Relevance
“…Vanhoef et al [15] provide a similar notion of declassification which allows declassification of partial information using a project function for specification. Vanhoef et al additionally allow the declassification of aggregated information over a history of events, making the declassification policy stateful.…”
Section: Related Workmentioning
confidence: 99%
“…Vanhoef et al [15] provide a similar notion of declassification which allows declassification of partial information using a project function for specification. Vanhoef et al additionally allow the declassification of aggregated information over a history of events, making the declassification policy stateful.…”
Section: Related Workmentioning
confidence: 99%
“…These scenarios can be handled in our approach by means of endorsement (the integrity variant of declassification [24,28]). …”
Section: Extensionsmentioning
confidence: 99%
“…Intuitively, time-sensitive noninterference is stronger than termination-sensitive noninterference because it requires that two executions starting in low-equal memories must terminate within the same number of program execution steps. Other works [10,20,26] have proposed other information flow properties, declassification properties, for modified SME monitors. We do not study in this work SME-based monitors for declassification.…”
Section: Related Workmentioning
confidence: 99%
“…The new monitor, that we call MF-TSNI, is not semantically equivalent to MFd-TSNI, and is not TSNI transparent. Both SME [10,20,26], and MF [4] have been extended to handle declassification, a security property more versatile than noninterference. It is left as future work to understand if our results generalize to declassification properties in order to compare SME and MF.…”
Section: Soundnessmentioning
confidence: 99%