Nlanguage-based information-flow security pdf

Abstractcurrent standard security practices do not pro vide substantial. There are four directions of research in languagebased security. We list the main features of jif and discuss the information flow problem that jif helps to solve. We present a comprehensive information flow tracking browser section 5 based. Languagebased informationflow security ieee journal on. In this paper, we survey the past three decades of research on informationflow security, particularly focusing on work that uses static program analysis to enforce informationflow policies. Language based information flow security purdue cs. Current standard security practices do not provide substantial assurance that the endtoend behavior of a computing system satisfies important security policies such as confidentiality. In this report, we examine jif, a java extension which augments the language with features related to security. Language based information flow security andrei sabelfield andrew c myers presentation ashish kundu ashishk cs purdue edu ashish kundu cs590f purdue 02 12 07 outline security requirements information flow background language based information flow open challenges discussion conclusion ashish kundu cs590f purdue 02 12 07 information flow h h confidential h confidential.

In class we saw discretionary and mandatory access control. Current standard security practices do not provide substantial assurance that the endtoend behavior of a computing system satisfies important. Languagebased informationflow security ieee journals. Languagebased informationflow security steve zdancewic university of pennsylvania. Languagebased informationflow security andrei sabelfeld and andrew c. Jif adds support for security labels to javas type system such that the developer can specify confidentiality and integrity policies to the various variables used in their program. An endtoend confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attackers. Languagebased informationflow security article pdf available in ieee journal on selected areas in communications 211 february 20 with 252 reads how we measure reads. Languagebased information flow security gradebuddy.

An endtoend confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attackers observations of system output. Languagebased informationflow security semantic scholar. Myers abstractcurrent standard security practices do not provide substantial assurance that the endtoend behavior of a computing system satis. Previously, a promising new approach has been developed. Each of the following sections examines a particular challenge for deploying languagebased informationflow technology.

1498 908 1342 1238 936 417 1359 663 518 271 1296 252 1267 150 1443 658 139 1365 74 869 1506 452 582 49 1359 1413 810 1246 427 382 750