期刊文献+

一种基于代码块的指令级信息流机密性检查框架研究

Framework Based on Code-block for Information Flow Confidential Security Checking
下载PDF
导出
摘要 二进制形式的第三方插件是威胁计算机安全的主要来源之一.经分析,目前可用于抵御第三方插件安全威胁的安全检查和分析机制具有较大局限性和低效性.对此本文给出一种静态扫描和运行时动态检查相结合的指令级信息流机密性检查框架,对其中的指令扫描与调谐、机密信息注册等关键问题给出具体解决方案,制定了示例安全策略,结合实验结果验证了该机制的可行性和有效性. The BTPP(binary third part plugin) is one of the factors that destroy eomputer's security. Now those mechanisms that could be used to protect system from BTPP are limitary or inefficient. This paper gives one framework that combines static-scan with dynamic-checking to check information flow confidential security. Several important problems are resolved and this mechanism' s feasibility and validity are validated by experiments' results.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第7期1331-1335,共5页 Journal of Chinese Computer Systems
基金 安徽省自然科学基金项目(070412030)资助
关键词 指令级 静态扫描 运行时 机密性 instruction-level static-scan runtime confidential
  • 相关文献

参考文献1

二级参考文献12

  • 1Sabelfeld A,Myers A C.Language-based information-flow security[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 2Goguen J A,Meseguer J.Security policies and security models[C].Proceedings of IEEE Symposium on Security and Privacy,1982:11-20.
  • 3Denning D E,Denning P J.Certification of programs for secure information flow[J].Communications of the ACM,1976,19(5):236-243.
  • 4Volpano D,Geoffrey S,Irvine Cynthia.A sound type system for secure flow analysis[J].Journal of Computer Security,1996,4(3):167-187.
  • 5Myers A C,Barbara Liskov.Complete,safe information flow with decentralized labels[C].Proceedings of IEEE Symposium on Security and Privacy,USA,May 1998:186-197.
  • 6Myers A C.Jflow:practical mostly-static information flow control[C].Proceedings of the 26th ACM Symposium on POPL,1999:228-241.
  • 7Zdancewic S.A type system for robust declassification[C].Proceedings of the 19th Conference on the Mathematical Foundations of Programming Semantics.Electronic Notes in Theoretical Computer Science,March 2003.
  • 8Pottier F,Simonet V.Information flow inference for ML[J].ACM Transactions on Programming Languages and Systems,2003,25(1):117-158.
  • 9Nielson F,Nielson H R,Hankin C.Principles of program analysis[M].Springer,1999.
  • 10Barbuti R,Bernardeschi C,Francesco N.De.abstract interpretation of operational semantics for secure information flow[J].Information Processing Letters,July 2002,83():101-108.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部