Execution Monitoring and Information Flow Properties

نویسندگان

  • Naoyuki Nagatou
  • Takuo Watanabe
چکیده

The purpose of this paper is to show that typical information flow policies can be enforced by enforcement mechanisms that work by monitoring a system execution at run time. the system execution represent an event sequence in the system. Our enforcement mechanism has extra structure. In this paper the extra structure become an emulator to work on a subsequence of the observed sequence in order to discuss an information flow property. The enforcement mechanisms obtains not only execution sequences of targets but subsequences restricted to events of partial targets. An information flow policy will define relations between groups of users on a system. The relations signify a direction that the system allows information to flow. Some user processes, using covert channel, are able to flow an information against the policy. If the information can be flowed form a sender process to a receiver process we are required to detect the channel(also called path). The enforcement mechanism can eventually discover such a violation of information flow policies and thus prevents information leaks to be exploited. Since the bandwidth of the covert channel is narrow, the receiver process to a covert channel can be terminated by the mechanism before all of the information is received.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of RFID to Improve Materials Flow in Mega-projects Site

In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...

متن کامل

The Role of RFID to Improve Materials Flow in Mega-projects Site

In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...

متن کامل

Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the informati...

متن کامل

Monitoring explicit information flow using Java byte-code instrumentation

Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. that is made available by the end users of the software is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as credit...

متن کامل

DOG: Efficient Information Flow Tracing and Program Monitoring with Dynamic Binary Rewriting

In this paper, we present DOG (Dynamic Observant Guard), an efficient information flow tracing and program monitoring system. Our system is based on dynamic binary rewriting. We proposed a number of novel techniques such as memory mapping to reduce overhead in tracing of data and monitoring of program execution. We have demonstrated that our system is effective in protecting against various kin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005