Computer Science ›› 2015, Vol. 42 ›› Issue (12): 243-246.

Previous Articles     Next Articles

Two-dimension Declassification Policy in Multithreaded Environments

JIN Li and ZHU Hao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Information declassification aims at secure release of sensitive information.Existing security specifications and enforcement mechanisms of declassification policies focus on sequential programs,and they can not be directlytransplanted to multithreaded environments for that attackers can take advantage of some properties of thread scheduling to derive sensitive information.To this end,a two-dimension declassification policy in multithreaded environments was proposed,based on the multi-threaded programming language model and thread scheduling model,effectively ensuring that appropriate information is released at the appropriate point of programs.Moreover,dynamic monitoring mechanisms of the policy in multithreaded environments were presented,and the soundness of enforcements was proved.

Key words: Information flow,Multithreaded environments,Confidentiality,Non-interference

[1] Sabelfeld A,Sands D.Declassification:dimensions and principles[J].Journal of Computer Security,2009,7(5):517-548
[2] Sabelfeld A,Russo A.Securing interaction between threads and the scheduler [C]∥19th IEEE Computer Security Foundations Workshop.2006:177-189
[3] Sabelfeld A.The impact of synchronisation on secure information flow in concurrent programs [M]∥Perspectives of System Informatics,LNCS 2244.2001:225-239
[4] Smith G,Volpano D.Secure information flow in a multi-threaded imperative language [C]∥25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.1998:355-364
[5] Mantel H,Reinhard A.Controlling the what and where of declassification in language-based security [M]∥Programming Languages and Systems,LNCS 4421.2007:141-156
[6] Lux A,Mantel H,Perner M.Scheduler-Independent Declassification [M]∥Mathematics of Program Construction,LNCS 7342.2012:25-47
[7] 姜励,陈健,平玲娣,等.多线程程序的信息抹除和降密安全策略[J].浙江大学学报(工学版),2010 (5):854-862 Jiang L,Chen J,Ping L D,et al,Security policy for information erasing and leaking in multithreaded codes[J].Journal of Zhejiang University(Engineering Science),2010(5):854-862
[8] Focardi R,Gorrieri R,Martinelli F.Non Interference for the Analysis of Cryptographic Protocols[M]∥Automata Languages and Programming,LNCS 1853.2000:354-372
[9] Russo A,Sabelfeld A.Securing interaction between threads and the scheduler [C]∥19th IEEE Computer Security Foundations Workshop.2006:177-189
[10] 朱浩,庄毅,薛羽,等.基于内容和地点维度的机密信息降级策略[J].计算机科学,2012,9(8):153-157 Zhu H,Zhuang Y,Xue Y,et al,Declassification Policy Based on Content and Location Dimensions[J].Computer Science,2012,9(8):153-157
[11] Askarov A,Myers A.A semantic framework for declassification and endorsement[M]∥Programming Languages and Systems,LNCS 6012.2010:64-84
[12] 李沁,袁志祥.一种宽容的多线程程序内部时间信息流类型系统[J].计算机科学,2014,1(3):163-168 Li Qin,Yuan Zhi-xiang.Permissive Type System for Internal Timing Information Flow in Multi-thread Programs[J].Computer Science,2014,1(3):163-168

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .