OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online security. Communication between nodes can be observed by network level attackers as it inherently takes place in the open. Despite online services increasingly using encrypted traffic, the shape of the traffic is not hidden. To prevent traffic analysis, the shape of a system's traffic must be independent of secrets. We investigate adapting the data-oblivious approach the reactive setting and present OblivIO, a secure language for writing reactive programs driven by network events. Our approach pads with dummy messages to hide which program sends are genuinely executed. We use an information-flow type system to provably enforce timing-sensitive noninterference. The type system is extended with potentials to bound the overhead in traffic introduced by our approach. We address challenges that arise from joining data-oblivious and reactive programming and demonstrate the feasibility of our resulting language by developing an interpreter that implements security critical operations as constant-time algorithms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/24/2021

Towards Language-Based Mitigation of Traffic Analysis Attacks

Traffic analysis attacks pose a major risk for online security. Distinct...
research
06/21/2023

Tackling the Awkward Squad for Reactive Programming: The Actor-Reactor Model

Reactive programming is a programming paradigm whereby programs are inte...
research
02/14/2020

Gavial: Programming the web with multi-tier FRP

Developing web applications requires dealing with their distributed natu...
research
10/24/2018

Type-directed Bounding of Collections in Reactive Programs

Our aim is to statically verify that in a given reactive program, the le...
research
02/23/2018

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

Modern low-latency anonymity systems, no matter whether constructed as a...
research
12/15/2017

Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic

In criminal investigations, telecommunication wiretaps have become a com...
research
07/19/2023

LTL Synthesis on Infinite-State Arenas defined by Programs

This paper deals with the problem of automatically and correctly control...

Please sign up or login with your details

Forgot password? Click here to reset