Uncovering Information Flow Policy Violations in C Programs

07/03/2019
by   Darion Cassel, et al.
0

Programmers of cryptographic applications written in C need to avoid common mistakes such as sending private data over public channels, modifying trusted data with untrusted functions, or improperly ordering protocol steps. These secrecy, integrity, and sequencing policies can be cumbersome to check with existing general-purpose tools. We have developed a novel means of specifying and uncovering violations of these policies that allows for a much lighter-weight approach than previous tools. We embed the policy annotations in C's type system via a source-to-source translation and leverage existing C compilers to check for policy violations, achieving high performance and scalability. We show through case studies of recent cryptographic libraries and applications that our work is able to express detailed policies for large bodies of C code and can find subtle policy violations. To gain formal understanding of our policy annotations, we show formal connections between the policy annotations and an information flow type system and prove a noninterference guarantee.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/11/2019

Existential Types for Relaxed Noninterference

Information-flow security type systems ensure confidentiality by enforci...
research
03/10/2021

Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language

Compile-time information flow analysis has been a promising technique fo...
research
02/14/2018

Zero-Knowledge Password Policy Check from Lattices

Passwords are ubiquitous and most commonly used to authenticate users wh...
research
06/06/2020

Understanding Finite-State Representations of Recurrent Policy Networks

We introduce an approach for understanding finite-state machine (FSM) re...
research
09/16/2021

Towards a General-Purpose Dynamic Information Flow Policy

Noninterference offers a rigorous end-to-end guarantee for secure propag...
research
06/01/2023

A Formal Model for Secure Multiparty Computation

Although Secure Multiparty Computation (SMC) has seen considerable devel...
research
05/02/2019

Typed-based Relaxed Noninterference for Free

Despite the clear need for specifying and enforcing information flow pol...

Please sign up or login with your details

Forgot password? Click here to reset