Information-flow control on ARM and POWER multicore processors

被引:0
|
作者
Graeme Smith
Nicholas Coughlin
Toby Murray
机构
[1] Defence Science and Technology Group,School of Information Technology and Electrical Engineering
[2] The University of Queensland,School of Computing and Information Systems
[3] The University of Melbourne,undefined
来源
关键词
Information-flow security; Weak memory models; Non-blocking algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
Weak memory models implemented on modern multicore processors are known to affect the correctness of concurrent code. They can also affect whether or not the concurrent code is secure. This is particularly the case in programs where the security levels of variables are value-dependent, i.e., depend on the values of other variables. In this paper, we illustrate how instruction reordering allowed by ARM and POWER multicore processors leads to vulnerabilities in such programs, and present a compositional, flow-sensitive information-flow logic which can be used to detect such vulnerabilities. The logic allows step-local reasoning (one instruction at a time) about a thread’s security by tracking information about dependencies between instructions which guarantee their order of occurrence. Program security can then be established from individual thread security using rely/guarantee reasoning. The logic has been proved sound with respect to existing operational semantics using Isabelle/HOL, and implemented in an automatic symbolic execution tool.
引用
收藏
页码:251 / 293
页数:42
相关论文
共 50 条
  • [21] PATIENT INFORMATION-FLOW
    BLEKELI, RD
    INFORMATION PRIVACY, 1980, 2 (01): : 37 - 41
  • [22] Information-flow interfaces
    Bartocci, Ezio
    Ferrere, Thomas
    Henzinger, Thomas A.
    Nickovic, Dejan
    Oliveira da Costa, Ana
    FORMAL METHODS IN SYSTEM DESIGN, 2024,
  • [23] A Power Capping Controller for Multicore Processors
    Almoosa, N.
    Song, W.
    Wardi, Y.
    Yalamanchili, S.
    2012 AMERICAN CONTROL CONFERENCE (ACC), 2012, : 4709 - 4714
  • [24] Specifying information-flow controls
    Chivers, H
    Jacob, J
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 114 - 120
  • [25] INFORMATION-FLOW TO GENETICS JOURNALS
    BALOG, C
    SCIENTOMETRICS, 1986, 9 (1-2) : 51 - 57
  • [26] INFORMATION-FLOW IN VLSI DESIGN
    RATHMELL, JG
    INTEGRATION-THE VLSI JOURNAL, 1986, 4 (02) : 185 - 191
  • [27] ASYMMETRIES IN RELATIVISTIC INFORMATION-FLOW
    JARETT, K
    COVER, TM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1981, 27 (02) : 152 - 159
  • [28] TELECOMMUNICATION DEREGULATION AND INFORMATION-FLOW
    SARKAR, SK
    PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1984, 474 : 39 - 46
  • [29] ENTROPY, INFORMATION-FLOW AND VARIANCE IN REGULATORY CONTROL-SYSTEMS
    JONES, WE
    SMITH, W
    INTERNATIONAL JOURNAL OF CONTROL, 1976, 24 (02) : 239 - 246
  • [30] Realizing Software Vault on Android Through Information-Flow Control
    Shyamasundar, R. K.
    Kumar, N. V. Narendra
    Teltumde, Priyanka
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 1007 - 1014