2014 IEEE 27th Computer Security Foundations Symposium (CSF) (2014)
July 19, 2014 to July 22, 2014
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CSF.2014.14
Heiko Mantel , Tech. Univ. Darmstadt, Darmstadt, Germany
Matthias Perner , Tech. Univ. Darmstadt, Darmstadt, Germany
Jens Sauer , Tech. Univ. Darmstadt, Darmstadt, Germany
Research on information flow security for concurrent programs usually assumes sequential consistency although modern multi-core processors often support weaker consistency guarantees. In this article, we clarify the impact that relaxations of sequential consistency have on information flow security. We consider four memory models and prove for each of them that information flow security under this model does not imply information flow security in any of the other models. This result suggests that research on security needs to pay more attention to the consistency guarantees provided by contemporary hardware. The other main technical contribution of this article is a program transformation that soundly enforces information flow security under different memory models. This program transformation is significantly less restrictive than a transformation that first establishes sequential consistency and then applies a traditional information flow analysis for concurrent programs.
Computational modeling, Instruction sets, Security, Registers, Vectors, Iron, Concurrent computing
H. Mantel, M. Perner and J. Sauer, "Noninterference under Weak Memory Models," 2014 IEEE 27th Computer Security Foundations Symposium (CSF), Vienna, Austria, 2014, pp. 80-94.