Access Control and Information Flow in Transactional Memory

被引:0
|
作者
Cohen, Ariel [1 ]
van der Meyden, Ron [2 ]
Zuck, Lenore D. [3 ]
机构
[1] NYU, New York, NY 10003 USA
[2] Univ New S Wales, Sydney, NSW 2052, Australia
[3] Univ Illinois, Chicago, IL 60680 USA
来源
基金
澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to be insecure. This result applies even for a very simple policy prohibiting information flow from a high to a low security domain. The source of the insecurity is identified as the ability of agents to cause aborts of other agents' transactions. A generic implementation is defined, parameterized by a "may-abort" relation that defines which agents may cause aborts of other agents' transactions. This implementation is shown to be secure with respect to an intransitive information flow policy consistent with the access control table and "may-abort" relation. Using this result, Transactional Memory Coherence and Consistency, an implementation due to Hammond et al, is shown to be secure with respect to intransitive information flow policies. Moreover, it is shown how to modify Scott's arbitration policies using the may-abort relation, yielding a class of secure implementations closely related to Scott's scheme.
引用
收藏
页码:316 / +
页数:3
相关论文
共 50 条
  • [1] Snake: Control Flow Distributed Software Transactional Memory
    Saad, Mohamed M.
    Ravindran, Binoy
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, 2011, 6976 : 238 - 252
  • [2] Isolation-Safe Speculative Access Control for Hardware Transactional Memory
    Tajimi, Tomoki
    Hayashi, Masaki
    Futamase, Yuki
    Shioya, Ryota
    Goshima, Masahiro
    Tsumura, Tomoaki
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2018, : 517 - 520
  • [3] Ordered Scheduling in Control-Flow Distributed Transactional Memory
    Poudel, Pavan
    Rai, Shishir
    Guragain, Swapnil
    Sharma, Gokarna
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 67 - 83
  • [4] Ordered scheduling in control-flow distributed transactional memory
    Poudel, Pavan
    Rai, Shishir
    Guragain, Swapnil
    THEORETICAL COMPUTER SCIENCE, 2024, 993
  • [5] Session Types for Access and Information Flow Control
    Capecchi, Sara
    Castellani, Ilaria
    Dezani-Ciancaglini, Mariangiola
    Rezk, Tamara
    CONCUR 2010 - CONCURRENCY THEORY, 2010, 6269 : 237 - +
  • [6] Disjoint-access parallelism in software transactional memory
    Technion, Haifa, Israel
    不详
    Lect. Notes Comput. Sci., (72-97):
  • [7] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [8] Providing flexible access control to an information flow control model
    Chou, SC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 425 - 439
  • [9] On the Detectability of Control Flow Using Memory Access Patterns
    Buhren, Robert
    Hetzelt, Felicitas
    Pirnay, Niklas
    PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 48 - 53
  • [10] An integrated model for access control and information flow requirements
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 111 - 125