Dynamic Dependency Monitoring to Secure Information Flow

Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shroff, P., Smith, S., Thober, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 217
container_issue
container_start_page 203
container_title
container_volume
creator Shroff, P.
Smith, S.
Thober, M.
description Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.
doi_str_mv 10.1109/CSF.2007.20
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4271650</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4271650</ieee_id><sourcerecordid>4271650</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-7980b8bd7783f6c6f5512bbb189b02c33de5de4ac8082629b811816b88128e0c3</originalsourceid><addsrcrecordid>eNotjD1PwzAUAC0-JELpxMjiP5Dynh3bzyNKCVQqYijMVew4yKhxqiQI5d9Tqdxwtx1j9wgrRLCP5a5aCQBz0gXLhDQmV4Wyl-wWjLZKEFq6YhmClrm2ADdsOY7fcKJQSMpkjNZzqrvo-TocQ2pC8jN_61Oc-iGmLz71fBf8zxD4JrX90NVT7BOvDv3vHbtu68MYlv9dsM_q-aN8zbfvL5vyaZtHNGrKjSVw5BpjSLba61YpFM45JOtAeCmboJpQ1J6AhBbWESKhdkQoKICXC_Zw_sYQwv44xK4e5n0hDGoF8g-mK0Z0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Dynamic Dependency Monitoring to Secure Information Flow</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shroff, P. ; Smith, S. ; Thober, M.</creator><creatorcontrib>Shroff, P. ; Smith, S. ; Thober, M.</creatorcontrib><description>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><identifier>ISSN: 1063-6900</identifier><identifier>ISBN: 0769528198</identifier><identifier>ISBN: 9780769528199</identifier><identifier>EISSN: 2377-5459</identifier><identifier>DOI: 10.1109/CSF.2007.20</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Computer security ; Computerized monitoring ; Concrete ; Data security ; Information analysis ; Information security ; Java ; Runtime ; Terminology</subject><ispartof>20th IEEE Computer Security Foundations Symposium (CSF'07), 2007, p.203-217</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4271650$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4271650$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shroff, P.</creatorcontrib><creatorcontrib>Smith, S.</creatorcontrib><creatorcontrib>Thober, M.</creatorcontrib><title>Dynamic Dependency Monitoring to Secure Information Flow</title><title>20th IEEE Computer Security Foundations Symposium (CSF'07)</title><addtitle>CSF</addtitle><description>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><subject>Computer science</subject><subject>Computer security</subject><subject>Computerized monitoring</subject><subject>Concrete</subject><subject>Data security</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Java</subject><subject>Runtime</subject><subject>Terminology</subject><issn>1063-6900</issn><issn>2377-5459</issn><isbn>0769528198</isbn><isbn>9780769528199</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjD1PwzAUAC0-JELpxMjiP5Dynh3bzyNKCVQqYijMVew4yKhxqiQI5d9Tqdxwtx1j9wgrRLCP5a5aCQBz0gXLhDQmV4Wyl-wWjLZKEFq6YhmClrm2ADdsOY7fcKJQSMpkjNZzqrvo-TocQ2pC8jN_61Oc-iGmLz71fBf8zxD4JrX90NVT7BOvDv3vHbtu68MYlv9dsM_q-aN8zbfvL5vyaZtHNGrKjSVw5BpjSLba61YpFM45JOtAeCmboJpQ1J6AhBbWESKhdkQoKICXC_Zw_sYQwv44xK4e5n0hDGoF8g-mK0Z0</recordid><startdate>200707</startdate><enddate>200707</enddate><creator>Shroff, P.</creator><creator>Smith, S.</creator><creator>Thober, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200707</creationdate><title>Dynamic Dependency Monitoring to Secure Information Flow</title><author>Shroff, P. ; Smith, S. ; Thober, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-7980b8bd7783f6c6f5512bbb189b02c33de5de4ac8082629b811816b88128e0c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Computer science</topic><topic>Computer security</topic><topic>Computerized monitoring</topic><topic>Concrete</topic><topic>Data security</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Java</topic><topic>Runtime</topic><topic>Terminology</topic><toplevel>online_resources</toplevel><creatorcontrib>Shroff, P.</creatorcontrib><creatorcontrib>Smith, S.</creatorcontrib><creatorcontrib>Thober, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shroff, P.</au><au>Smith, S.</au><au>Thober, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Dynamic Dependency Monitoring to Secure Information Flow</atitle><btitle>20th IEEE Computer Security Foundations Symposium (CSF'07)</btitle><stitle>CSF</stitle><date>2007-07</date><risdate>2007</risdate><spage>203</spage><epage>217</epage><pages>203-217</pages><issn>1063-6900</issn><eissn>2377-5459</eissn><isbn>0769528198</isbn><isbn>9780769528199</isbn><abstract>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</abstract><pub>IEEE</pub><doi>10.1109/CSF.2007.20</doi><tpages>15</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6900
ispartof 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007, p.203-217
issn 1063-6900
2377-5459
language eng
recordid cdi_ieee_primary_4271650
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer science
Computer security
Computerized monitoring
Concrete
Data security
Information analysis
Information security
Java
Runtime
Terminology
title Dynamic Dependency Monitoring to Secure Information Flow
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T20%3A51%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Dynamic%20Dependency%20Monitoring%20to%20Secure%20Information%20Flow&rft.btitle=20th%20IEEE%20Computer%20Security%20Foundations%20Symposium%20(CSF'07)&rft.au=Shroff,%20P.&rft.date=2007-07&rft.spage=203&rft.epage=217&rft.pages=203-217&rft.issn=1063-6900&rft.eissn=2377-5459&rft.isbn=0769528198&rft.isbn_list=9780769528199&rft_id=info:doi/10.1109/CSF.2007.20&rft_dat=%3Cieee_6IE%3E4271650%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4271650&rfr_iscdi=true