Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Boniface Hicks is active.

Publication


Featured researches published by Boniface Hicks.


international conference on information systems security | 2008

Implicit Flows: Can't Live with `Em, Can't Live without `Em

Dave King; Boniface Hicks; Michael Hicks; Trent Jaeger

Verifying that programs trusted to enforce security actually do so is a practical concern for programmers and administrators. However, there is a disconnect between the kinds of tools that have been successfully applied to real software systems (such as taint mode in Perl and Ruby), and information-flow compilers that enforce a variant of the stronger security property of noninterference. Tools that have been successfully used to find security violations have focused on explicit flows of information, where high-security information is directly leaked to output. Analysis tools that enforce noninterference also prevent implicit flows of information, where high-security information can be inferred from a programs flow of control. However, these tools have seen little use in practice, despite the stronger guarantees that they provide. To better understand why, this paper experimentally investigates the explicit and implicit flows identified by the standard algorithm for establishing noninterference. When applied to implementations of authentication and cryptographic functions, the standard algorithm discovers many real implicit flows of information, but also reports an extremely high number of false alarms, most of which are due to conservative handling of unchecked exceptions (e.g., null pointer exceptions). After a careful analysis of all sources of true and false alarms, due to both implicit and explicit flows, the paper concludes with some ideas to improve the false alarm rate, toward making stronger security analysis more practical.


acm workshop on programming languages and analysis for security | 2006

Trusted declassification:: high-level policy for a security-typed language

Boniface Hicks; Dave King; Patrick D. McDaniel; Michael Hicks

Security-typed languages promise to be a powerful tool with which provably secure software applications may be developed. Programs written in these languages enforce a strong, global policy of noninterferencewhich ensures that high-security data will not be observable on low-security channels. Because noninterference is typically too strong a property, most programs use some form of declassification to selectively leak high security information, e.g. when performing a password check or data encryption. Unfortunately, such a declassification is often expressed as an operation within a given program, rather than as part of a global policy, making reasoning about the security implications of a policy more difficult.In this paper, we propose a simple idea we call trusted declassification in which special declassifier functions are specified as part of the global policy. In particular, individual principals declaratively specify which declassifiers they trust so that all information flows implied by the policy can be reasoned about in absence of a particular program. We formalize our approach for a Java-like language and prove a modified form of noninterference which we call noninterference modulo trusted methods. We have implemented our approach as an extension to Jif and provide some of our experience using it to build a secure e-mail client.


ACM Transactions on Information and System Security | 2010

A logical specification and analysis for SELinux MLS policy

Boniface Hicks; Sandra Julieta Rueda; Luke St. Clair; Trent Jaeger; Patrick D. McDaniel

The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subjects access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS. Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and s-property defined by Bell and LaPadula. We also evaluated whether the policy associated to a given application is compliant with the policy of the SELinux system in which it would be deployed.


symposium on access control models and technologies | 2010

An architecture for enforcing end-to-end access control over web applications

Boniface Hicks; Sandra Julieta Rueda; Dave King; Thomas Moyer; Joshua Schiffman; Yogesh Sreenivasan; Patrick D. McDaniel; Trent Jaeger

The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from multiple applications originating at multiple sources all intermix in a single web browser, making sensitive data stored in the browser subject to a broad milieu of attacks (cross-site scripting, cross-site request forgery and others). The fundamental problem is that existing web infrastructure provides no means for enforcing end-to-end security on data. To solve this we design an architecture using mandatory access control (MAC) enforcement. We overcome the limitations of traditional MAC systems, implemented solely at the operating system layer, by unifying MAC enforcement across virtual machine, operating system, networking and application layers. We implement our architecture using Xen virtual machine management, SELinux at the operating system layer, labeled IPsec for networking and our own label-enforcing web browser, called FlowwolF. We tested our implementation and find that it performs well, supporting data intermixing while still providing end-to-end security guarantees.


ACM Transactions on Information and System Security | 2008

Noninvasive Methods for Host Certification

Patrick Traynor; Michael Chien; Scott Weaver; Boniface Hicks; Patrick D. McDaniel

Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe on the privacy of users. In this article, we show that it is possible for clients to prove both the presence and proper functioning of security infrastructure without allowing unrestricted access to their system. We demonstrate this approach, specifically applied to antivirus security, by requiring clients seeking admission to a network to positively identify the presence or absence of malcode in a series of puzzles. The implementation of this mechanism and its application to real networks are also explored. In so doing, we demonstrate that it is not necessary for an administrator to be invasive to determine whether a client implements required security practices.


annual computer security applications conference | 2007

Channels: Runtime System Infrastructure for Security-Typed Languages

Boniface Hicks; Timothy Misiak; Patrick D. McDaniel

Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information flow labels, and the STL compiler guarantees that data always obeys its label as it flows within an application. As data flows into or out of an application, however, a runtime system is needed to mediate between the information flow world within the application and the non-information flow world of the operating system. In the few existing STL applications, this problem has been handled in ad hoc ways that hindered software engineering and security analysis. In this paper, we present a principled approach to STL runtime system development along with policy infrastructure and class abstractions for the STL, Jif that implement these principles. We demonstrate the effectiveness of our approach by using our infrastructure to develop a firewall application, Flow Wall, that provably enforces its policy.


international workshop on security | 2006

Non-Invasive Methods for Host Certification

Patrick Traynor; Michael Chien; Scott Weaver; Boniface Hicks; Patrick D. McDaniel

Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe upon the privacy of users. In this paper, we show that it is possible for clients to prove both the presence and proper functioning of security infrastructure without allowing unrestricted access to their system. We demonstrate this approach, specifically applied to anti-virus security, by requiring clients seeking admission to a network to positively identify the presence or absence of malcode in a series of puzzles. The implementation of this mechanism and its application to real networks are also explored. In so doing, we demonstrate that it is not necessary for an administrator to be invasive to determine whether a client implements good security practices


annual computer security applications conference | 2006

From Languages to Systems: Understanding Practical Application Development in Security-typed Languages

Boniface Hicks; Kiyan Ahmadizadeh; Patrick D. McDaniel


usenix annual technical conference | 2007

From trusted to secure: building and executing applications that enforce system security

Boniface Hicks; Sandra Julieta Rueda; Trent Jaeger; Patrick D. McDaniel


FCS | 2005

Dynamic updating of information-flo w policies

Stephan A Zdancewic; Michael Hicks; Stephen Tse; Boniface Hicks

Collaboration


Dive into the Boniface Hicks's collaboration.

Top Co-Authors

Avatar

Patrick D. McDaniel

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Dave King

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Trent Jaeger

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Sandra Julieta Rueda

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Michael Chien

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Scott Weaver

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Joshua Schiffman

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Kiyan Ahmadizadeh

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Luke St. Clair

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge