Towards a General-Purpose Dynamic Information Flow Policy

09/16/2021
by   Peixuan Li, et al.
0

Noninterference offers a rigorous end-to-end guarantee for secure propagation of information. However, real-world systems almost always involve security requirements that change during program execution, making noninterference inapplicable. Prior works alleviate the limitation to some extent, but even for a veteran in information flow security, understanding the subtleties in the syntax and semantics of each policy is challenging, largely due to very different policy specification languages, and more fundamentally, semantic requirements of each policy. We take a top-down approach and present a novel information flow policy, called Dynamic Release, which allows information flow restrictions to downgrade and upgrade in arbitrary ways. Dynamic Release is formalized on a novel framework that, for the first time, allows us to compare and contrast various dynamic policies in the literature. We show that Dynamic Release generalizes declassification, erasure, delegation and revocation. Moreover, it is the only dynamic policy that is both applicable and correct on a benchmark of tests with dynamic policy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/26/2017

Confidentiality enforcement by hybrid control of information flows

An information owner, possessing diverse data sources, might want to off...
research
01/04/2019

Information flow in a distributed security setting

Information flow security is classically formulated in terms of the abse...
research
03/10/2021

Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language

Compile-time information flow analysis has been a promising technique fo...
research
06/06/2018

A Policy based Security Architecture for Software Defined Networks

As networks expand in size and complexity, they pose greater administrat...
research
04/21/2021

A Calculus for Flow-Limited Authorization

Real-world applications routinely make authorization decisions based on ...
research
07/03/2019

Uncovering Information Flow Policy Violations in C Programs

Programmers of cryptographic applications written in C need to avoid com...
research
03/07/2019

Only Connect, Securely

The lattice model proposed by Denning in her seminal work provided secur...

Please sign up or login with your details

Forgot password? Click here to reset