Technical reports
Secure composition of untrusted code: wrappers and causality types
Peter Sewell, Jan Vitek
November 1999, 36 pages
| DOI | https://doi.org/10.48456/tr-478 |
Abstract
We consider the problem of assembling concurrent software systems from untrusted or partially trusted off-the-shelf components, using wrapper programs to encapsulate components and enforce security policies. In previous work we introduced the box-π process calculus with constrained interaction to express wrappers and discussed the rigorous formulation of their security properties. This paper addresses the verification of wrapper information flow properties. We present a novel causal type system that statically captures the allowed flows between wrapped possibly-badly-typed components; we use it to prove that a unidirectional-flow wrapper enforces a causal flow property.
Full text
PS (0.2 MB)
BibTeX record
@TechReport{UCAM-CL-TR-478,
author = {Sewell, Peter and Vitek, Jan},
title = {{Secure composition of untrusted code: wrappers and
causality types}},
year = 1999,
month = nov,
url = {https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-478.ps.gz},
institution = {University of Cambridge, Computer Laboratory},
doi = {10.48456/tr-478},
number = {UCAM-CL-TR-478}
}