On confidentiality and algorithms

被引:5
作者
Agat, J
Sands, D
机构
来源
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2001年
关键词
D O I
10.1109/SECPRI.2001.924288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? In this paper we discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without leaking any confidential information, either directly, indirectly, or through timing behaviour. We pay particular attention to the issue of timing channels caused by the cache behaviour, and argue that it is necessary to disable the effect of the cache in order to construct algorithms manipulating pointers to objects in such a way that they satisfy the conditions of noninterference. We also discuss how randomisation can be used to implement secure algorithms, and discuss how randomised hash tables might be made practically secure.
引用
收藏
页码:64 / 77
页数:14
相关论文
共 20 条
[1]  
Abadi M., 1997, LECT NOTES COMPUTER, V1281, P611
[2]  
AGAT J, 2001, THESIS CHALMERS U TE
[3]  
[Anonymous], 2000, P POPL 00
[4]  
[Anonymous], 1978, FDN SECURE COMPUTATI
[5]  
[Anonymous], 1968, P APR 30 MAY 2 1968
[6]   CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW [J].
DENNING, DE ;
DENNING, PJ .
COMMUNICATIONS OF THE ACM, 1977, 20 (07) :504-513
[7]  
Dietzfelbinger M., 1996, LECT NOTES COMPUTER, V1046, P569
[8]  
DOR D, 1995, PROCEEDINGS OF THE SIXTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P28
[9]  
Goguen J.A., 1982, P IEEE S SEC PRIV
[10]  
Gray J. W. III, 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P170, DOI 10.1109/RISP.1990.63848