Principles of Data Flow Integrity: Specification and Enforcement

نویسندگان

  • Toktam Ramezanifarkhani
  • Mohammadreza Razzazi
چکیده

Subverting runtime data flow is common in many current software attacks. Data Flow Integrity (DFI) is a policy whose satisfaction can prevent such attacks. This paper develops a formal foundation on DFI specification, and characteristics of its enforcement techniques with formulations of hypotheses and guarantees. Enforcement techniques are based on static analysis and program monitoring at runtime. This foundation can be used for practical satisfaction of DFI and help establish guarantees in every applied platform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Expression and Enforcement of Dynamic Integrity Constraints

The interest in consistency enforcement in the field of database and in expert systems is nowadays widespread. Special attention has been given in the literature to the subtopic of static integrity constraints. This paper centers instead on the automatic enforcement of dynamic consistency constraints, i.e. those integrity constraints that cannot be checked by solely inspecting the most recent s...

متن کامل

Declarative Taxonomic Constraint Enforcement in Conceptual Schemas (Extended Version)

We propose to declaratively specify policies for the enforcement of taxonomic integrity constraints directly in the structural conceptual schema. These policies depend on the kind of constraint to be enforced (disjointness, covering or specialization) and on the particular event that may cause its violation. We provide a formal definition of these policies and of the repair actions that must be...

متن کامل

AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitive page content to confidentiality and integrity attacks launched by advertisements. In this paper, we propose a novel framework for addressing security threats posed by third-party advertisements. The heart of our fram...

متن کامل

Principles of Safety Bus Systems – Part Ii

This paper is the second part of principles of safety bus systems. In the first part the requirements and specifications were detailed to be considered and fulfilled to design safety bus systems. The second part introduces data integrity in more detail and compares mathematically different architectures of safety-bus-systems. Copyright © 2006 USTARTH

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2015