Practical Information Flow Control in Real-World Systems: Cryptography, Reference Monitor, and Confidential Computing

Guardat en:
Dades bibliogràfiques
Publicat a:ProQuest Dissertations and Theses (2025)
Autor principal: Zhou, Quan
Publicat:
ProQuest Dissertations & Theses
Matèries:
Accés en línia:Citation/Abstract
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3266811596
003 UK-CbPIL
020 |a 9798297672031 
035 |a 3266811596 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Zhou, Quan 
245 1 |a Practical Information Flow Control in Real-World Systems: Cryptography, Reference Monitor, and Confidential Computing 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a In an era of increasingly complex and security-critical software systems, the ability to reason about how information propagates during program execution is essential to ensuring confidentiality and integrity. Information flow control provides a principled foundation for enforcing such guarantees. Classical information flow control approaches, grounded in noninterference and supported by rich formal foundations, have played a substantial role in the development of language-based security and secure system design. Recent advances in program analysis, type systems, and formal verification have further strengthened the theoretical underpinnings of information flow control. With the emergence of mechanisms like declassification and endorsement, information flow control has evolved to address practical challenges in real-world systems, enabling developers to enforce security policies that are both sound and flexible.However, applying information flow control in practice remains challenging. A core reason for this disconnect is that different applications domain impose fundamentally different security requirements and policy specifications. Many real-world systems demand information flow analyses that balance precision, soundness, and scalability, while others require enforcement of less explored policies with complex security lattices. In general, existing information flow enforcement techniques either rely on overly conservative approximations—leading to false positives that overwhelm developers—or depend on heavyweight verification frameworks that are difficult to deploy. Others assume simple policies or trusted infrastructures that are unrealistic in modern systems, like confidential computing.This dissertation explores three such use scenarios, each representing a distinctive class of control enforcement where existing technics in information flow control fall short.First, we develop CtChecker, a static analysis framework for verifying constant-time behavior in cryptographic algorithm implementations. CtChecker detects secret-dependent control flow and memory access patterns, achieving sound detection of timing side-channel vulnerabilities while significantly reducing false positives and maintaining scalability. By enabling field sensitivity, context sensitivity, partial flow sensitivity, and support for declassification, CtChecker finds a balanced solution for the practical verification of real-world cryptographic systems.Next, we present Talisman, a system for verifying the integrity of authorization request inputs in reference monitors. Talisman introduces a relaxed noninterference property tailored to the reference monitor security model, drastically reducing false alarms related to input tampering. Moreover, it employs a hybrid endorsement mechanism to distinguish between policy-intended behavior and exploitable violations. These innovations allow Talisman to soundly enforce the tamperproof property, an understudied requirement for reference monitors, even under complex and application-specific security lattices.Finally, we build Agora to address information flow control in the context of confidential computing, where minimizing the trusted computing base (TCB) of security verification is essential. Agora is designed to support coarse-grained information flow control, which is well-suited for maintaining user data confidentiality in function-as-a-service (FaaS) environments running inside trusted execution environments (TEEs). By offloading complex program analysis and constraint solving to untrusted infrastructure, and relying on checkable evidence validated by a small, independently verifiable core, Agora ensures that high-level security properties are preserved and can be remotely attested.Together, these systems demonstrate that practical information flow control is achievable when enforcement is grounded in the specific needs of its target domain. By designing precise, scalable, and trust-aware enforcement mechanisms, this dissertation brings information flow control closer to its full potential as a security foundation for real-world applications. 
653 |a Cryptography 
653 |a Software 
653 |a Blockchain 
653 |a Violations 
653 |a Discipline 
653 |a Enforcement 
653 |a Endorsements 
653 |a Access control 
653 |a Computer science 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3266811596/abstract/embedded/75I98GEZK8WCJMPQ?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3266811596/fulltextPDF/embedded/75I98GEZK8WCJMPQ?source=fedsrch