Verified enforcement of stateful information release policies

  • Authors:
  • Nikhil Swamy;Michael Hicks

  • Affiliations:
  • University of Maryland, College Park, College Park, MD, USA;University of Maryland, College Park, College Park, MD, USA

  • Venue:
  • Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces its information release policy. Our approach has two parts. First, an information release policy is specified as a security automaton written in a new language called AIR. Second, we enforce an AIR policy by translating it into an API for programs written in LAIR, a core formalism for a functional programming language. LAIR uses a novel combination of dependent, affine, and singleton types to ensure that the API is used correctly. As a consequence we can certify that programs written in LAIR meet the requirements of the original AIR policy specification.