Show simple item record

dc.contributor.authorAustin, Thomas H.
dc.contributor.authorYang, Jean
dc.contributor.authorFlanagan, Cormac
dc.contributor.authorSolar-Lezama, Armando
dc.date.accessioned2014-10-10T12:24:08Z
dc.date.available2014-10-10T12:24:08Z
dc.date.issued2013-06
dc.identifier.isbn9781450321440
dc.identifier.urihttp://hdl.handle.net/1721.1/90875
dc.description.abstractIt is important for applications to protect sensitive data. Even for simple confidentiality and integrity policies, it is often difficult for programmers to reason about how the policies should interact and how to enforce policies across the program. A promising approach is policy-agnostic programming, a model that allows the programmer to implement policies separately from core functionality. Yang et al. describe Jeeves, a programming language that supports information flow policies describing how to reveal sensitive values in different output channels. Jeeves uses symbolic evaluation and constraint-solving to produce outputs adhering to the policies. This strategy provides strong confidentiality guarantees but limits expressiveness and implementation feasibility. We extend Jeeves with faceted values, which exploit the structure of sensitive values to yield both greater expressiveness and to facilitate reasoning about runtime behavior. We present a faceted semantics for Jeeves and describe a model for propagating multiple views of sensitive information through a program. We provide a proof of termination-insensitive non-interference and describe how the semantics facilitate reasoning about program behavior.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-0905650)en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency. The Ubiquitous High Performance Computing Programen_US
dc.description.sponsorshipFacebook (Firm) (Fellowship)en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2465106.2465121en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleFaceted execution of policy-agnostic programsen_US
dc.typeArticleen_US
dc.identifier.citationThomas H. Austin, Jean Yang, Cormac Flanagan, and Armando Solar-Lezama. 2013. Faceted execution of policy-agnostic programs. In Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS '13). ACM, New York, NY, USA, 15-26.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorYang, Jeanen_US
dc.contributor.mitauthorSolar Lezama, Armandoen_US
dc.relation.journalProceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS '13)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsAustin, Thomas H.; Yang, Jean; Flanagan, Cormac; Solar-Lezama, Armandoen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-7604-8252
dc.identifier.orcidhttps://orcid.org/0000-0002-3995-291X
dspace.mitauthor.errortrue
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record