19 research outputs found

    An Information Flow Approach to Fault-Tolerant Security and Information Erasure

    No full text
    Sensitive information is a crucial asset for both individuals and companies. Since it is processed in a largely automated way, it is important that the computational infrastructures are equipped with methods for reasoning about and enforcing security policies. Information flow security has been proposed for this purpose in many contexts. This thesis explores the applicability of information flow security to two novel scenarios.The first part of the thesis reasons about the confidentiality of sensitive data when systems are disrupted by environmental noise. We formalize a family of information flow security properties for this context, and investigate two strategies to enforce them. The strategies differ in their nature (program transformation vs program analysis), in the assumption about the underlying hardware model (the amount of fault-tolerance provided by the system) and in the security property they guarantee.The second part of the thesis focuses on an important but less-studied aspect of security, namely information erasure. We want to make sure that programs dispose of sensitive data when it is no longer necessary. We reason about the problem from two perspectives. On the theoretical side we improve the information flow characterization of erasure by introducing a framework for expressing quantitative and conditional erasure policies. Also, we establish a model for the sensitive data provider, whose behavior determines whether erasure can be successfully performed or not. On the practical side we propose an enforcement mechanism (as a Python library) that allows programmers to enforce erasure policies with minor annotations of existing code

    A user model for information erasure.

    No full text
    Hunt and Sands (ESOP\u2708) studied a notion of information erasure for systems which receive secrets intended for limited-time use. Erasure demands that once a secret has fulfilled its purpose the subsequent behaviour of the system should reveal no information about the erased data. In this paper we address a shortcoming in that work: for erasure to be possible the user who provides data must also play his part, but previously that role was only specified informally. Here we provide a formal model of the user and a collection of requirements called erasure friendliness. We prove that an erasure-friendly user can be composed with an erasing system (in the sense of Hunt and Sands) to obtain a combined system which is jointly erasing in an appropriate sense. In doing so we identify stronger requirements on the user than those informally described in the previous work

    A user model for information erasure.

    No full text
    Hunt and Sands (ESOP\u2708) studied a notion of information erasure for systems which receive secrets intended for limited-time use. Erasure demands that once a secret has fulfilled its purpose the subsequent behaviour of the system should reveal no information about the erased data. In this paper we address a shortcoming in that work: for erasure to be possible the user who provides data must also play his part, but previously that role was only specified informally. Here we provide a formal model of the user and a collection of requirements called erasure friendliness. We prove that an erasure-friendly user can be composed with an erasing system (in the sense of Hunt and Sands) to obtain a combined system which is jointly erasing in an appropriate sense. In doing so we identify stronger requirements on the user than those informally described in the previous work

    Fault-resilient non-interference

    No full text
    Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which lead to corruption of stored values. Mission-critical devices require such faults to be mitigated by fault-tolerance - a combination of techniques that aim at preserving the functional behaviour of a system despite the disruptive effects of transient faults. Fault-tolerance typically has a high deployment cost - special hardware might be required to implement it - and provides weak statistical guarantees. It is also based on the assumption that faults are rare. In this paper, we consider scenarios where security, rather than functional correctness, is the main asset to be protected. Our main contribution is a theory for expressing confidentiality of data in the presence of transient faults. We show that the natural probabilistic definition of security in the presence of faults can be captured by a possibilistic definition. Furthermore, the possibilistic definition is implied by a known bisimulation-based property, called Strong Security. We illustrate the utility of these results for a simple RISC architecture for which only the code memory and program counter are assumed fault-tolerant. We present a type-directed compilation scheme that produces RISC code from a higher-level language for which Strong Security holds - i.e. well-typed programs compile to RISC code which is secure despite transient faults. In contrast with fault-tolerance solutions, our technique assumes relatively little special hardware, gives formal guarantees, and works in the presence of an active attacker who aggressively targets parts of a system and induces faults precisely

    Fault-tolerant Non-interference

    No full text
    This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top of a formal model that encompasses both the fault-prone machine and the faulty environment. A precise characterization of the class of programs for which the method guarantees transparency is provided

    Implementing Erasure Policies Using Taint Analysis

    No full text
    Security or privacy-critical applications often require access to sensitive information in order to function. But in accordance with the principle of least privilege – or perhaps simply for legal compliance – such applications should not retain said information once it has served its purpose. In such scenarios, the timely disposal of data is known as an information erasure policy. This paper studies software-level information erasure policies for the data manipulated by programs. The paper presents a new approach to the enforcement of such policies. We adapt ideas from dynamic taint analysis to track how sensitive data sources propagate through a program and erase them on demand. The method is implemented for Python as a library, with no modifications to the runtime system. The library is easy to use, and allows programmers to indicate information-erasure policies with only minor modifications to their code

    Mammalian glomus tumor: Contribution of nerve ultrasound

    No full text
    Glomus tumor is an enigmatic tumor derived from proliferation of the normal capsular\u2013neural glomus apparatus of the skin. This type of tumor is usually painful and may be solitary or multiple. Tenderness and cold hypersensitivity are other common symptoms with marked impairment of quality of life. It usually occurs in men from the fourth to the seventh decade. Localization of this tumor is highly variable, with major prevalence at subungual sites. The low frequency of glomus tumor and the heterogeneous presentation often delay diagnosis. An atypical anatomical site and the usually small size of the tumor may further complicate diagnosis. Nerve ultrasound (US) is considered an efficient tool for diagnosis of nerve diseases

    Perioperative analgesia in the elderly

    Get PDF
    The administration of analgesic drugs in elderly patients should take into account age-related physiological changes, loss of efficiency of homeostatic mechanisms, and pharmacological interactions with chronic therapies. Underestimation of pain in patients with impaired cognition is often linked to difficulties in pain assessment. In the preoperative phase, it is essential to assess the physical status, cognitive reserve, and previous chronic pain conditions to plan effective analgesia. Furthermore, an accurate pharmacological history of the patient must be collected to establish any possible interaction with the whole perioperative analgesic plan. The use of analgesic drugs with different mechanisms of action for pain relief in the intraoperative phase is a crucial step to achieve adequate postoperative pain control in older adults. The combined multimodal and opioid-sparing strategy is strongly recommended to reduce side effects. The use of various adjuvants is also preferable. Moreover, the implementation of non-pharmacological approaches may lead to faster recovery. High-quality postoperative analgesia in older patients can be achieved only with a collaborative interdisciplinary team. The aim of this review is to highlight the perioperative pain management strategies in the elderly with a special focus on intraoperative pharmacological interventions
    corecore