Search
  • 网站搜寻
亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。
返回搜索结果

Multi-level Information Security in Information Flow Tracking


技术应用

Industries that require security (trusted platforms, secure storage, network devices, etc.) and/or integrity (real-time operating systems, critical embedded system controllers, etc.) stand to gain the most from this technology. Even automobile OEMs will require secure systems, now that all new vehicles are controlled by dozens of embedded microcontrollers. A very high demand for this technology is anticipated, as it is the first tool in the industry to formally validate security and integrity properties spanning across hardware and software, enabling more efficient solutions while maintaining system integrity.


详细技术说明

To allow full account for information flow security in critical systems, researchers have proposed Gate-Level Information Flow Tracking (GLIFT). GLIFT monitors all digital information flows by tracking individual bits through Boolean gates. At such a low level of abstraction, GLIFT is able to capture all transition activities including register to register timing. As a result, all digital information flows are made explicit, including timing channels that are inherent in the underlying hardware implementation but invisible to programmers.Previous work has illustrated the employment of GLIFT for building verifiably information flow secure high-assurance systems. GLIFT has been shown to be effective in detecting timing channels in bus protocols such as I2C and USB. Although GLIFT provides an effective approach for enforcing information flow security, the existing GLIFT method targets a two-level linear security lattice and thus only considers two-level security labels, e.g., trusted < untrusted or, the dual, unclassified < confidential. However, most systems benefit from or require multi-level security (MLS). For example, data objects are usually classified into at least four security levels, namely Top secret, secret, confidential and unclassified in military systems. A two-level linear security lattice simply cannot be used for modeling such a policy. In addition, many systems tend to be interested in non-linear lattices for modeling security policies.For example, it is often desirable to have a policy which requires isolation of the highest security level (Top Secret) from several incomparable entities (e.g., Secret US and Secret UK). That is, the model specifies that Secret US and Secret UK are at the same level but represent two different objects. More specifically, Top Secret might be the label for a data encryption process which requires that Secret US and Secret UK learn nothing other than the cipher-text while it is perfectly secure for processes SecretUS and Secret UK to learn information about one another. Thus, there is a need to expand GLIFT to more general security lattices in order to adapt to a wider range of systems.Given here is an advancement of the GLIFT binary security model, enabling multi-level security for information flow tracking systems built into the hardware level.This model classifies data objects in a system into different security levels, tracks the flow of information between security domains, and enforces a specific security policy such as non-interference. While non-interference is a strong and useful security policy, it requires tight information flow control (IFC) to prevent unintended interactions between different system components resulting from harmful flows of information.


申请号码

20160026801


其他

Tech ID/UC Case

23222/2013-209-0


Related Cases

2013-209-0


国家/地区

美国

欲了解更多信息,请点击 这里
Business of IP Asia Forum
桌面版