Skip to main content

Analysing the Information Flow Properties of Object-Capability Patterns

  • Conference paper
Book cover Formal Aspects in Security and Trust (FAST 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5983))

Included in the following conference series:

Abstract

We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of object-capability patterns require one to be aware, a priori, of all possible mechanisms for covert information flow that might be present within a pattern, in order to detect covert channels within it. We show how the CSP process algebra, and its model-checker FDR, can be applied to overcome this limitation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elkaduwe, D., Klein, G., Elphinstone, K.: Verified protection model of the seL4 microkernel. In: Shankar, N., Woodcock, J. (eds.) VSTTE 2008. LNCS, vol. 5295, pp. 99–114. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Focardi, R.: Comparing two information flow security properties. In: Proceedings of CSFW 1996, pp. 116–122. IEEE Computer Society, Los Alamitos (1996)

    Google Scholar 

  3. Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security 3(1), 5–33 (1995)

    Google Scholar 

  4. Formal Systems (Europe), Limited. FDR2 User Manual (2005)

    Google Scholar 

  5. Grove, D., Murray, T., Owen, C., North, C., Jones, J., Beaumont, M.R., Hopkins, B.D.: An overview of the Annex system. In: Proceedings of ACSAC 2007 (2007)

    Google Scholar 

  6. Lazić, R.S.: A Semantic Study of Data Independence with Applications to Model Checking. D.Phil. thesis. Oxford University Computing Laboratory (1999)

    Google Scholar 

  7. Lowe, G.: On information flow and refinement-closure. In: Proceedings of the Workshop on Issues in the Theory of Security, WITS 2007 (2007)

    Google Scholar 

  8. Mettler, A.M., Wagner, D.: The Joe-E language specification, version 1.0. Technical Report EECS-2008-91, University of California, Berkeley (August 2008)

    Google Scholar 

  9. Miller, M.S.: Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis. Johns Hopkins University (2006)

    Google Scholar 

  10. Miller, M.S., Samuel, M., Laurie, B., Awad, I., Stay, M.: Caja: Safe active content in sanitized JavaScript, draft (2008)

    Google Scholar 

  11. Murray, T.: Analysing the Security Properties of Object-Capability Patterns. D.Phil. thesis. University of Oxford (2010) (Forthcoming)

    Google Scholar 

  12. Murray, T., Lowe, G.: On refinement-closed security properties and nondeterministic compositions. In: Proceedings of AVoCS 2008, pp. 49–68 (2009)

    Google Scholar 

  13. Rohrmair, G.T., Lowe, G.: Using data-independence in the analysis of intrusion detection systems. Theoretical Computer Science 340(1), 82–101 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  14. Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  15. Roscoe, A.W., Broadfoot, P.J.: Proving security protocols with model checkers by data independence techniques. J. Comput. Secur. 7(2-3), 147–190 (1999)

    Google Scholar 

  16. Roscoe, A.W., Goldsmith, M.H.: What is intransitive noninterference? In: Proceedings of CSFW 1999, p. 228. IEEE Computer Society, Los Alamitos (1999)

    Google Scholar 

  17. Ryan, P., Schneider, S.: Process algebra and non-interference. Journal of Computer Security 9(1/2), 75–103 (2001)

    Google Scholar 

  18. Ryan, P.Y.A.: A CSP formulation of non-interference and unwinding. IEEE Cipher, 19–30 (Winter 1991)

    Google Scholar 

  19. Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1208–1308 (1975)

    Article  Google Scholar 

  20. Spiessens, A.: Patterns of Safe Collaboration. PhD thesis, Université catholique de Louvain, Louvain-la-Neuve, Belgium (February 2007)

    Google Scholar 

  21. van der Meyden, R.: Architectural refinement and notions of intransitive noninterference. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 60–74. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Murray, T., Lowe, G. (2010). Analysing the Information Flow Properties of Object-Capability Patterns. In: Degano, P., Guttman, J.D. (eds) Formal Aspects in Security and Trust. FAST 2009. Lecture Notes in Computer Science, vol 5983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12459-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12459-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12458-7

  • Online ISBN: 978-3-642-12459-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics