Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 217 |
---|---|
container_issue | |
container_start_page | 203 |
container_title | |
container_volume | |
creator | Shroff, P. Smith, S. Thober, M. |
description | Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved. |
doi_str_mv | 10.1109/CSF.2007.20 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4271650</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4271650</ieee_id><sourcerecordid>4271650</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-7980b8bd7783f6c6f5512bbb189b02c33de5de4ac8082629b811816b88128e0c3</originalsourceid><addsrcrecordid>eNotjD1PwzAUAC0-JELpxMjiP5Dynh3bzyNKCVQqYijMVew4yKhxqiQI5d9Tqdxwtx1j9wgrRLCP5a5aCQBz0gXLhDQmV4Wyl-wWjLZKEFq6YhmClrm2ADdsOY7fcKJQSMpkjNZzqrvo-TocQ2pC8jN_61Oc-iGmLz71fBf8zxD4JrX90NVT7BOvDv3vHbtu68MYlv9dsM_q-aN8zbfvL5vyaZtHNGrKjSVw5BpjSLba61YpFM45JOtAeCmboJpQ1J6AhBbWESKhdkQoKICXC_Zw_sYQwv44xK4e5n0hDGoF8g-mK0Z0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Dynamic Dependency Monitoring to Secure Information Flow</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shroff, P. ; Smith, S. ; Thober, M.</creator><creatorcontrib>Shroff, P. ; Smith, S. ; Thober, M.</creatorcontrib><description>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><identifier>ISSN: 1063-6900</identifier><identifier>ISBN: 0769528198</identifier><identifier>ISBN: 9780769528199</identifier><identifier>EISSN: 2377-5459</identifier><identifier>DOI: 10.1109/CSF.2007.20</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Computer security ; Computerized monitoring ; Concrete ; Data security ; Information analysis ; Information security ; Java ; Runtime ; Terminology</subject><ispartof>20th IEEE Computer Security Foundations Symposium (CSF'07), 2007, p.203-217</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4271650$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4271650$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shroff, P.</creatorcontrib><creatorcontrib>Smith, S.</creatorcontrib><creatorcontrib>Thober, M.</creatorcontrib><title>Dynamic Dependency Monitoring to Secure Information Flow</title><title>20th IEEE Computer Security Foundations Symposium (CSF'07)</title><addtitle>CSF</addtitle><description>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><subject>Computer science</subject><subject>Computer security</subject><subject>Computerized monitoring</subject><subject>Concrete</subject><subject>Data security</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Java</subject><subject>Runtime</subject><subject>Terminology</subject><issn>1063-6900</issn><issn>2377-5459</issn><isbn>0769528198</isbn><isbn>9780769528199</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjD1PwzAUAC0-JELpxMjiP5Dynh3bzyNKCVQqYijMVew4yKhxqiQI5d9Tqdxwtx1j9wgrRLCP5a5aCQBz0gXLhDQmV4Wyl-wWjLZKEFq6YhmClrm2ADdsOY7fcKJQSMpkjNZzqrvo-TocQ2pC8jN_61Oc-iGmLz71fBf8zxD4JrX90NVT7BOvDv3vHbtu68MYlv9dsM_q-aN8zbfvL5vyaZtHNGrKjSVw5BpjSLba61YpFM45JOtAeCmboJpQ1J6AhBbWESKhdkQoKICXC_Zw_sYQwv44xK4e5n0hDGoF8g-mK0Z0</recordid><startdate>200707</startdate><enddate>200707</enddate><creator>Shroff, P.</creator><creator>Smith, S.</creator><creator>Thober, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200707</creationdate><title>Dynamic Dependency Monitoring to Secure Information Flow</title><author>Shroff, P. ; Smith, S. ; Thober, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-7980b8bd7783f6c6f5512bbb189b02c33de5de4ac8082629b811816b88128e0c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Computer science</topic><topic>Computer security</topic><topic>Computerized monitoring</topic><topic>Concrete</topic><topic>Data security</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Java</topic><topic>Runtime</topic><topic>Terminology</topic><toplevel>online_resources</toplevel><creatorcontrib>Shroff, P.</creatorcontrib><creatorcontrib>Smith, S.</creatorcontrib><creatorcontrib>Thober, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shroff, P.</au><au>Smith, S.</au><au>Thober, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Dynamic Dependency Monitoring to Secure Information Flow</atitle><btitle>20th IEEE Computer Security Foundations Symposium (CSF'07)</btitle><stitle>CSF</stitle><date>2007-07</date><risdate>2007</risdate><spage>203</spage><epage>217</epage><pages>203-217</pages><issn>1063-6900</issn><eissn>2377-5459</eissn><isbn>0769528198</isbn><isbn>9780769528199</isbn><abstract>Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new run-time information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</abstract><pub>IEEE</pub><doi>10.1109/CSF.2007.20</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6900 |
ispartof | 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007, p.203-217 |
issn | 1063-6900 2377-5459 |
language | eng |
recordid | cdi_ieee_primary_4271650 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer science Computer security Computerized monitoring Concrete Data security Information analysis Information security Java Runtime Terminology |
title | Dynamic Dependency Monitoring to Secure Information Flow |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T20%3A51%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Dynamic%20Dependency%20Monitoring%20to%20Secure%20Information%20Flow&rft.btitle=20th%20IEEE%20Computer%20Security%20Foundations%20Symposium%20(CSF'07)&rft.au=Shroff,%20P.&rft.date=2007-07&rft.spage=203&rft.epage=217&rft.pages=203-217&rft.issn=1063-6900&rft.eissn=2377-5459&rft.isbn=0769528198&rft.isbn_list=9780769528199&rft_id=info:doi/10.1109/CSF.2007.20&rft_dat=%3Cieee_6IE%3E4271650%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4271650&rfr_iscdi=true |