Secure Serverless Computing Using Dynamic Information Flow Control

02/25/2018
by   Kalev Alpernas, et al.
0

The rise of serverless computing provides an opportunity to rethink cloud security. We present an approach for securing serverless systems using a novel form of dynamic information flow control (IFC). We show that in serverless applications, the termination channel found in most existing IFC systems can be arbitrarily amplified via multiple concurrent requests, necessitating a stronger termination-sensitive non-interference guarantee, which we achieve using a combination of static labeling of serverless processes and dynamic faceted labeling of persistent data. We describe our implementation of this approach on top of JavaScript for AWS Lambda and OpenWhisk serverless platforms, and present three realistic case studies showing that it can enforce important IFC security properties with low overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/05/2020

Reconciling progress-insensitive noninterference and declassification

Practitioners of secure information flow often face a design challenge: ...
research
07/26/2023

Hydra Battles and AC Termination, Revisited

We present a termination proof for the Battle of Hercules and Hydra repr...
research
08/04/2022

Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers

In security-critical software applications, confidential information mus...
research
03/22/2022

ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification

Non-interference is a popular way to enforce confidentiality of sensitiv...
research
04/11/2020

Analysing Flow Security Properties in Virtualised Computing Systems

This paper studies the problem of reasoning about flow security properti...
research
11/10/2020

Guarding Serverless Applications with SecLambda

As an emerging application paradigm, serverless computing attracts atten...
research
11/03/2020

Fast Computation of Strong Control Dependencies

We introduce new algorithms for computing non-termination sensitive cont...

Please sign up or login with your details

Forgot password? Click here to reset