Scheduler-related Confidentiality for Multi-threaded Programs

نویسندگان

  • Marieke Huisman
  • Tri Minh Ngo
چکیده

Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables. Several formal definitions of observational determinism exist, but all of them have shortcomings; for example they accept insecure programs or they reject too many innocent programs. Besides, all the proposed definitions of observational determinism are not scheduler-independent: A program that is secure under one kind of scheduler might not be secure when executed with a different scheduler. The existing definitions do not ensure that a program behaves securely when the scheduling policy changes. Therefore, this paper proposes a new formalization of scheduler-specific observational determinism. It accepts programs that are secure when executed under a specific scheduler. Moreover, it is less restrictive on harmless programs under a particular scheduling policy. We discuss the properties of our definition and argue why it better approximates the intuitive understanding of observational determinism. Under the worst case assumption, i.e., where an attacker can choose the scheduler, the security specification should be scheduler-independent. Therefore, in addition, we propose a definition of scheduler-independent observational determinism that is robust with respect to any particular scheduling policy. Thus scheduler-independence means that if a program is accepted by a security specification then an attacker cannot derive any secret information from it, regardless of which scheduler is used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scheduler-Specific Confidentiality for Multi-threaded Programs and Its Logic-Based Verification

Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the scheduling policy. Several formal definitions of observational determinism exist, but all of them have sho...

متن کامل

Quantitative Security Analysis for Multi-threaded Programs

Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel with only input and output, and the measure of leakage is based on the notions of initial uncertain...

متن کامل

Confidentiality for Probabilistic Multi-threaded Programs and Its Verification

Confidentiality is an important concern in today’s information society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multithreading poses new challenges to data protection, in particular, data races may be exploited in security attacks. Also, th...

متن کامل

Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs

In today’s information-based society, guaranteeing information security plays animportant role in all aspects of life: governments, military, companies, financialinformation systems, web-based services etc. With the existence of Internet,Google, and shared-information networks, it is easier than ever to access infor-mation. However, it is also harder than ever to protect the sec...

متن کامل

Qualitative and quantitative information flow analysis for multi-thread programs

In today’s information-based society, guaranteeing information security plays animportant role in all aspects of life: governments, military, companies, financialinformation systems, web-based services etc. With the existence of Internet,Google, and shared-information networks, it is easier than ever to access infor-mation. However, it is also harder than ever to protect the sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011