Execution Monitoring and Information Flow Properties
نویسندگان
چکیده
The purpose of this paper is to show that typical information flow policies can be enforced by enforcement mechanisms that work by monitoring a system execution at run time. the system execution represent an event sequence in the system. Our enforcement mechanism has extra structure. In this paper the extra structure become an emulator to work on a subsequence of the observed sequence in order to discuss an information flow property. The enforcement mechanisms obtains not only execution sequences of targets but subsequences restricted to events of partial targets. An information flow policy will define relations between groups of users on a system. The relations signify a direction that the system allows information to flow. Some user processes, using covert channel, are able to flow an information against the policy. If the information can be flowed form a sender process to a receiver process we are required to detect the channel(also called path). The enforcement mechanism can eventually discover such a violation of information flow policies and thus prevents information leaks to be exploited. Since the bandwidth of the covert channel is narrow, the receiver process to a covert channel can be terminated by the mechanism before all of the information is received.
منابع مشابه
The Role of RFID to Improve Materials Flow in Mega-projects Site
In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...
متن کاملThe Role of RFID to Improve Materials Flow in Mega-projects Site
In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...
متن کاملRuntime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the informati...
متن کاملMonitoring explicit information flow using Java byte-code instrumentation
Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. that is made available by the end users of the software is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as credit...
متن کاملDOG: Efficient Information Flow Tracing and Program Monitoring with Dynamic Binary Rewriting
In this paper, we present DOG (Dynamic Observant Guard), an efficient information flow tracing and program monitoring system. Our system is based on dynamic binary rewriting. We proposed a number of novel techniques such as memory mapping to reduce overhead in tracing of data and monitoring of program execution. We have demonstrated that our system is effective in protecting against various kin...
متن کامل