The Community for Technology Leaders
2014 IEEE 27th Computer Security Foundations Symposium (CSF) (2014)
Vienna, Austria
July 19, 2014 to July 22, 2014
ISSN: 1063-6900
ISBN: 978-1-4799-4290-9
pp: 80-94
Heiko Mantel , Tech. Univ. Darmstadt, Darmstadt, Germany
Matthias Perner , Tech. Univ. Darmstadt, Darmstadt, Germany
Jens Sauer , Tech. Univ. Darmstadt, Darmstadt, Germany
ABSTRACT
Research on information flow security for concurrent programs usually assumes sequential consistency although modern multi-core processors often support weaker consistency guarantees. In this article, we clarify the impact that relaxations of sequential consistency have on information flow security. We consider four memory models and prove for each of them that information flow security under this model does not imply information flow security in any of the other models. This result suggests that research on security needs to pay more attention to the consistency guarantees provided by contemporary hardware. The other main technical contribution of this article is a program transformation that soundly enforces information flow security under different memory models. This program transformation is significantly less restrictive than a transformation that first establishes sequential consistency and then applies a traditional information flow analysis for concurrent programs.
INDEX TERMS
Computational modeling, Instruction sets, Security, Registers, Vectors, Iron, Concurrent computing
CITATION

H. Mantel, M. Perner and J. Sauer, "Noninterference under Weak Memory Models," 2014 IEEE 27th Computer Security Foundations Symposium (CSF), Vienna, Austria, 2014, pp. 80-94.
doi:10.1109/CSF.2014.14
162 ms
(Ver 3.3 (11022016))