Dependent Information Flow Types

被引:0
|
作者
Lourenco, Luisa [1 ]
Caires, Luis [1 ]
机构
[1] Univ Nova Lisboa, Fac Ciencias & Tecnol, CITI & NOVA Lab Comp Sci & Informat, P-1200 Lisbon, Portugal
关键词
Information Flow; Dependent Type Systems;
D O I
10.1145/2775051.2676994
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we develop a novel notion of dependent information flow types. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs, including programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields, still considered a challenge to security enforcement in software systems such as data-centric web-based applications. We base our development on the very general setting of a minimal lambda-calculus with references and collections. We illustrate its expressiveness, showing how secure operations on relevant scenarios can be modelled and analysed using our dependent information flow type system, which is also shown to be amenable to algorithmic type checking. Our main results include type-safety and non-interference theorems ensuring that well-typed programs do not violate prescribed security policies.
引用
收藏
页码:317 / 328
页数:12
相关论文
共 50 条
  • [1] Secure Information Flow Verification with Mutable Dependent Types
    Ferraiuolo, Andrew
    Hua, Weizhe
    Myers, Andrew C.
    Suh, G. Edward
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [2] Verification of Information Flow and Access Control Policies with Dependent Types
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 165 - 179
  • [3] On the expressiveness and semantics of information flow types
    Rajani, Vineet
    Garg, Deepak
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (01) : 129 - 156
  • [4] Session Types for Access and Information Flow Control
    Capecchi, Sara
    Castellani, Ilaria
    Dezani-Ciancaglini, Mariangiola
    Rezk, Tamara
    CONCUR 2010 - CONCURRENCY THEORY, 2010, 6269 : 237 - +
  • [5] Quantitative information flow, relations and polymorphic types
    Clark, D
    Hunt, S
    Malacaria, P
    JOURNAL OF LOGIC AND COMPUTATION, 2005, 15 (02) : 181 - 199
  • [6] Information-Flow Types for Homomorphic Encryptions
    Fournet, Cedric
    Planul, Jeremy
    Rezk, Tamara
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 351 - 360
  • [7] Content dependent information flow control
    Nielson, Hanne Riis
    Nielson, Flemming
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 87 : 6 - 32
  • [8] DIFFUSION OF JOMON POTTERY TYPES AS INFORMATION-FLOW
    YOSHIYA, U
    MINZOKUGAKU KENKYU-JAPANESE JOURNAL OF ETHNOLOGY, 1980, 44 (04): : 335 - 365
  • [9] From polyvariant flow information to intersection and union types
    Palsberg, J
    Pavlopoulou, C
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2001, 11 : 263 - 317
  • [10] Policy Dependent and Independent Information Flow Analyses
    Toews, Manuel
    Wehrheim, Heike
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 362 - 378