Abstract
In security, layout randomization is a popular, effective attack mitigation technique. Recent work has aimed to explain it rigorously, focusing on deterministic systems. In this paper, we study layout randomization in the presence of nondeterministic choice. We develop a semantic approach based on denotational models and the induced notions of contextual public observation, characterized by simulation relations. This approach abstracts from language details, and helps manage the delicate interaction between nondeterminism and probability. In particular, memory access probabilities are not independent, but rather depend on a fixed probability distribution over memory layouts; we therefore model probability using random variables rather than any notion of probabilistic powerdomain
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Goldwasser, S., Micali, S.: Probabilistic encryption. JCSS 28, 270–299 (1984)
Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: 6th Workshop on Hot Topics in Operating Systems, pp. 67–72 (1997)
Druschel, P., Peterson, L.L.: High-performance cross-domain data transfer. Technical Report TR 92-11, Department of Computer Science, The University of Arizona (1992)
PaX Project: The PaX project (2004), http://pax.grsecurity.net/
Erlingsson, Ú.: Low-level software security: Attacks and defenses. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 92–134. Springer, Heidelberg (2007)
Pucella, R., Schneider, F.B.: Independence from obfuscation: A semantic framework for diversity. Journal of Computer Security 18(5), 701–749 (2010)
Abadi, M., Plotkin, G.D.: On protection by layout randomization. ACM Transactions on Information and System Security 15(2), 1–8 (2012)
Jagadeesan, R., Pitcher, C., Rathke, J., Riely, J.: Local memory via layout randomization. In: 24th IEEE Computer Security Foundations Symposium, pp. 161–174 (2011)
Abadi, M., Planul, J.: On layout randomization for arrays and functions. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 167–185. Springer, Heidelberg (2013)
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, pp. 112–121 (1998)
Mitchell, J.C., Ramanathan, A., Scedrov, A., Teague, V.: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. TCS 353(1-3), 118–164 (2006)
Canetti, R., Cheung, L., Kaynar, D.K., Liskov, M., Lynch, N.A., Pereira, O., Segala, R.: Analyzing security protocols using time-bounded task-pioas. Discrete Event Dynamic Systems 18(1), 111–159 (2008)
Gierz, G., Hofmann, K.H., Keimel, K., Lawson, J.D., Mislove, M.W., Scott, D.S.: Continuous lattices and domains. Encyclopaedia of mathematics and its applications, vol. 93. CUP (2003)
Mislove, M.W.: On combining probability and nondeterminism. ENTCS 162, 261–265 (2006)
Tix, R., Keimel, K., Plotkin, G.D.: Semantic domains for combining probability and non-determinism. ENTCS 222, 3–99 (2009)
Goubault-Larrecq, J.: Prevision domains and convex powercones. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 318–333. Springer, Heidelberg (2008)
Abadi, M., Planul, J., Plotkin, G.D.: Layout randomization and nondeterminism. ENTCS 298, 29–50 (2013)
Abadi, M., Lamport, L.: The existence of refinement mappings. TCS 82(2), 253–284 (1991)
Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: 13th IEEE Computer Security Foundations Workshop, pp. 200–214 (2000)
Klarlund, N., Schneider, F.B.: Proving nondeterministically specified safety properties using progress measures. Information and Computation 107(1), 151–170 (1993)
de Roever, W.P., Engelhardt, K.: Data Refinement: Model-oriented Proof Theories and their Comparison. Cambridge Tracts in Theo. Comp. Sci., vol. 46. CUP (1998)
Jackson, M.: A sheaf theoretic approach to measure theory. PhD thesis, U. Pitt. (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Abadi, M., Planul, J., Plotkin, G.D. (2014). Layout Randomization and Nondeterminism. In: van Breugel, F., Kashefi, E., Palamidessi, C., Rutten, J. (eds) Horizons of the Mind. A Tribute to Prakash Panangaden. Lecture Notes in Computer Science, vol 8464. Springer, Cham. https://doi.org/10.1007/978-3-319-06880-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-06880-0_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06879-4
Online ISBN: 978-3-319-06880-0
eBook Packages: Computer ScienceComputer Science (R0)