Motivation:
• Hard to reason about implications of every action by untrusted
code
• chroot can break application assumptions
• system call interposition error-prone
• Easier to specify policy in terms of where to where information can flow
• Unlike other IFC systems, HiStar implements standard OS abstractions on top of lower level building blocks that obey IFC
• Taint tracking mechanism does not leak info itself