Visible to the public Epistemic Models for Security - October 2014

Public Audience
Purpose: To highlight project progress. Information is generally at a higher level which is accessible to the interested public. All information contained in the report (regions 1-3) is a Government Deliverable/CDRL.

PI(s): Robert Harper (CMU)
Co-PI(s):
Researchers:

HARD PROBLEM(S) ADDRESSED
Scalability and Composability

Our work addresses the hard problem of scalability and composability. Programs whose security has been expressed through their types in a secure type system are inherently composable. Our framework for defining and reasoning about secure programs helps develop provably secure components that can be combined to create a secure system.

PUBLICATIONS
N/A

ACCOMPLISHMENT HIGHLIGHTS

Key Highlights:

* Our methodology can prove useful properties about what flows of information are and are not possible as a result of concrete authorization policies. We investigated specific example policies and reasoned about the epistemic consequences of programs adhering to these policies.


* Timing channels become important when programs running on behalf of different principals all interact with a central certificate authority that regulates the policy statements made by various principals. We found in related work that timing channels can be substantially mitigated by placing a buffer between the program and the certificate authority.