Information-flow control on ARM and POWER multicore processors

被引:0
|
作者
Graeme Smith
Nicholas Coughlin
Toby Murray
机构
[1] Defence Science and Technology Group,School of Information Technology and Electrical Engineering
[2] The University of Queensland,School of Computing and Information Systems
[3] The University of Melbourne,undefined
来源
关键词
Information-flow security; Weak memory models; Non-blocking algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
Weak memory models implemented on modern multicore processors are known to affect the correctness of concurrent code. They can also affect whether or not the concurrent code is secure. This is particularly the case in programs where the security levels of variables are value-dependent, i.e., depend on the values of other variables. In this paper, we illustrate how instruction reordering allowed by ARM and POWER multicore processors leads to vulnerabilities in such programs, and present a compositional, flow-sensitive information-flow logic which can be used to detect such vulnerabilities. The logic allows step-local reasoning (one instruction at a time) about a thread’s security by tracking information about dependencies between instructions which guarantee their order of occurrence. Program security can then be established from individual thread security using rely/guarantee reasoning. The logic has been proved sound with respect to existing operational semantics using Isabelle/HOL, and implemented in an automatic symbolic execution tool.
引用
收藏
页码:251 / 293
页数:42
相关论文
共 50 条
  • [1] Information-flow control on ARM and POWER multicore processors
    Smith, Graeme
    Coughlin, Nicholas
    Murray, Toby
    FORMAL METHODS IN SYSTEM DESIGN, 2021, 58 (1-2) : 251 - 293
  • [2] On Formalizing Information-Flow Control Libraries
    Vassena, Marco
    Russo, Alejandro
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16), 2016, : 15 - 28
  • [3] DESIGN OF INFORMATION-FLOW FOR PRODUCTION CONTROL
    BENDEICH, E
    LANG, F
    WERKSTATTSTECHNIK ZEITSCHRIFT FUR INDUSTRIELLE FERTIGUNG, 1974, 64 (11): : 682 - 686
  • [4] Information-Flow Control with Fading Labels
    Bedford, Andrew
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 388 - 390
  • [5] INFORMATION-FLOW
    不详
    NATION, 1981, 233 (04) : 101 - 102
  • [6] IDENTIFICATIONAL CONTROL OF INFORMATION-FLOW IN NETWORK STRUCTURES
    FIALKOWSKI, K
    JASTRZEBSKI, S
    INTERNATIONAL FORUM ON INFORMATION AND DOCUMENTATION, 1978, 3 (01): : 18 - 21
  • [7] CONTROL OF INFORMATION-FLOW IN COMPUTER-NETWORKS
    LAZAREV, VG
    ENGINEERING CYBERNETICS, 1983, 21 (05): : 67 - 78
  • [8] A verified static information-flow control library
    Vassena, Marco
    Russo, Alejandro
    Buiras, Pablo
    Waye, Lucas
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2018, 95 : 148 - 180
  • [9] Information-flow control for programming on encrypted data
    Mitchell, John C.
    Sharma, Rahul
    Stefan, Deian
    Zimmerman, Joe
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 45 - 60
  • [10] LONELY AT THE TOP - THE EFFECT OF POWER ON INFORMATION-FLOW IN THE DYAD
    EARLE, WB
    GIULIANO, T
    ARCHER, RL
    PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 1983, 9 (04) : 629 - 637