Information-flow control on ARM and POWER multicore processors

被引:0
|
作者
Graeme Smith
Nicholas Coughlin
Toby Murray
机构
[1] Defence Science and Technology Group,School of Information Technology and Electrical Engineering
[2] The University of Queensland,School of Computing and Information Systems
[3] The University of Melbourne,undefined
来源
关键词
Information-flow security; Weak memory models; Non-blocking algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
Weak memory models implemented on modern multicore processors are known to affect the correctness of concurrent code. They can also affect whether or not the concurrent code is secure. This is particularly the case in programs where the security levels of variables are value-dependent, i.e., depend on the values of other variables. In this paper, we illustrate how instruction reordering allowed by ARM and POWER multicore processors leads to vulnerabilities in such programs, and present a compositional, flow-sensitive information-flow logic which can be used to detect such vulnerabilities. The logic allows step-local reasoning (one instruction at a time) about a thread’s security by tracking information about dependencies between instructions which guarantee their order of occurrence. Program security can then be established from individual thread security using rely/guarantee reasoning. The logic has been proved sound with respect to existing operational semantics using Isabelle/HOL, and implemented in an automatic symbolic execution tool.
引用
收藏
页码:251 / 293
页数:42
相关论文
共 50 条
  • [31] Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
    Vassena, Marco
    Buiras, Pablo
    Waye, Lucas
    Russo, Alejandro
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 538 - 557
  • [32] LOCAL AREA NETWORKS EXPAND THE HORIZONS OF CONTROL AND INFORMATION-FLOW
    LADUZINSKY, AJ
    CONTROL ENGINEERING, 1983, 30 (07) : 53 - 56
  • [33] CONCEPT OF A CLOSED INFORMATION-FLOW
    ARAPOV, MV
    LIBKIND, AN
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 2-INFORMATSIONNYE PROTSESSY I SISTEMY, 1977, (06): : 1 - 15
  • [34] THE IMPACT OF PACS ON THE INFORMATION-FLOW
    GLASS, HI
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1992, 30 (3-4): : 229 - 234
  • [35] NATIONAL LIMITS OF INFORMATION-FLOW
    BRITTAIN, JM
    SOCIETY, 1985, 22 (05) : 3 - 9
  • [36] ANALYSIS OF THE INFORMATION-FLOW ON PSORIASIS
    VASHCHENKO, LI
    MORDOVTSEV, VN
    PROKHOROVA, ES
    VESTNIK DERMATOLOGII I VENEROLOGII, 1979, (04) : 24 - 29
  • [37] FREE INFORMATION-FLOW ADVOCATED
    DICKINSON, TG
    ENGLISH, PM
    JOURNAL OF THE AMERICAN PLANNING ASSOCIATION, 1986, 52 (02) : 221 - 222
  • [38] UNIFYING THE INFORMATION-FLOW IN THE OFFICE
    不详
    INFOSYSTEMS, 1982, 29 (06): : 3 - 6
  • [39] A verified information-flow architecture
    de Amorim, Arthur Azevedo
    Collins, Nathan
    DeHon, Andre
    Demange, Delphine
    Hritcu, Catalin
    Pichardie, David
    Pierce, Benjamin C.
    Pollack, Randy
    Tolmach, Andrew
    JOURNAL OF COMPUTER SECURITY, 2016, 24 (06) : 689 - 734
  • [40] INFORMATION-FLOW AND WORKER PRODUCTIVITY
    GOLDMAN, AS
    MANAGEMENT SCIENCE, 1959, 5 (03) : 270 - 278