skip to main content
10.1145/2591062.2591195acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Exception handling for dynamic information flow control

Published:31 May 2014Publication History

ABSTRACT

Exceptions are a source of information leaks, which are difficult to handle as they allow for non-local control transfer. Existing dynamic information flow control techniques either ignore unstructured control flow or are restrictive. This work presents a more permissive solution for controlling information leaks using program analysis techniques.

References

  1. A. Askarov and A. Sabelfeld. Catch me if you can: Permissive yet secure error handling. In Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS ’09, pages 45–57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. H. Austin and C. Flanagan. Efficient purely-dynamic information flow analysis. In Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS ’09, pages 113–124, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. H. Austin and C. Flanagan. Permissive dynamic information flow analysis. In Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS ’10, pages 3:1–3:12, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Bichhawat, V. Rajani, D. Garg, and C. Hammer. Information flow control in WebKit’s JavaScript bytecode. In Proceedings of the 3rd Conference on Principles of Security and Trust, POST ’14, LNCS 8414, pages 159–178, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged information flow for JavaScript. In ACM SIGPLAN PLDI, pages 50–62, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236–243, May 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. E. Denning. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.Google ScholarGoogle Scholar
  8. M. Dhawan and V. Ganapathy. Analyzing information flow in JavaScript-based browser extensions. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC ’09, pages 382–391, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. O. Foundation. Information leakage. https://www.owasp.org/index.php/Information_Leakage, June 2013.Google ScholarGoogle Scholar
  10. J. A. Goguen and J. Meseguer. Security policies and security models. In Proceedings of the 1982 IEEE Symposium on Security and Privacy, pages 11–20, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Guarnieri, M. Pistoia, O. Tripp, J. Dolby, S. Teilhet, and R. Berg. Saving the world wide web from vulnerable JavaScript. In Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA ’11, pages 177–187, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Hedin, A. Birgisson, L. Bello, and A. Sabelfeld. JSFlow: Tracking information flow in JavaScript and its APIs. In Proceedings of the 29th ACM Symposium on Applied Computing, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Hedin and A. Sabelfeld. Information-flow security for a core of JavaScript. In Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium, CSF ’12, pages 3–18, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Just, A. Cleary, B. Shirley, and C. Hammer. Information flow analysis for JavaScript. In Proceedings of the 1st ACM SIGPLAN International Workshop on Programming Language and Systems Technologies for Internet Clients, PLASTIC ’11, pages 9–18, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst., 1(1):121–141, Jan. 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Masri and A. Podgurski. Algorithms and tool support for dynamic information flow analysis. Information & Software Technology, 51(2):385––404, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. C. Myers. JFlow: Practical mostly-static information flow control. In Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’99, pages 228–241, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Richards, C. Hammer, S. Jagannathan, F. Zappa Nardelli, and J. Vitek. Flexible access control policies with delimited histories and revocation. In OOPSLA ’13, 2013.Google ScholarGoogle Scholar
  19. A. Sabelfeld and A. C. Myers. Language-based information-flow security. IEEE Journal on Selected Areas in Communications, 21:5–19, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. J. Comput. Secur., 4(2-3):167–187, Jan. 1996. Google ScholarGoogle ScholarCross RefCross Ref
  21. B. Xin and X. Zhang. Efficient online detection of dynamic control dependence. In Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA ’07, pages 185–195, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Exception handling for dynamic information flow control

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering
        May 2014
        741 pages
        ISBN:9781450327688
        DOI:10.1145/2591062

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 May 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate276of1,856submissions,15%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader