From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
- 1 December 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 153-164
- https://doi.org/10.1109/acsac.2006.30
Abstract
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple "toy" programs. As described in this paper, we have developed the first real-world, security-typed application: a secure email system written in the Java language variant Jif. Real-world policies are mapped onto the information flows controlled by the language primitives, and we consider the process and tractability of broadly enforcing security policy in commodity applications. We find that while the language provided the rudimentary tools to achieve low-level security goals, additional tools, services, and language extensions were necessary to formulate and enforce application policy. We detail the design and use of these tools. We also show how the strong guarantees of Jif in conjunction with our policy tools can be used to evaluate security. This work serves as a starting point-we have demonstrated that it is possible to implement real-world systems and policy using security-typed languages. However, further investigation of the developer tools and supporting policy infrastructure is necessary before they can fulfil their considerable promise of enabling more secure systemsKeywords
This publication has 17 references indexed in Scilit:
- Managing Policy Updates in Security-Typed LanguagesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Trusted declassification:Published by Association for Computing Machinery (ACM) ,2006
- Dimensions and Principles of DeclassificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Composing security policies with polymerPublished by Association for Computing Machinery (ACM) ,2005
- How to make secure email easier to usePublished by Association for Computing Machinery (ACM) ,2005
- A simple view of type-secure information flow in the π-calculusPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- A Type System for Robust DeclassificationElectronic Notes in Theoretical Computer Science, 2003
- Protecting privacy using the decentralized label modelACM Transactions on Software Engineering and Methodology, 2000
- JFlowPublished by Association for Computing Machinery (ACM) ,1999