Abstract non-interference - Parameterizing non-interference by abstract interpretation

被引:102
|
作者
Giacobazzi, R [1 ]
Mastroeni, I [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37134 Verona, Italy
关键词
abstract interpretation; non-interference; language-based security; abstract domains;
D O I
10.1145/982962.964017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we generalize the notion of non-interference making it parametric relatively to what an attacker can analyze about the input/output information flow. The idea is to consider attackers as data-flow analyzers, whose task is to reveal properties of confidential resources by analyzing public ones. This means that no unauthorized flow of information is possible from confidential to public data, relatively to the degree of precision of an attacker. We prove that this notion can be fully specified in standard abstract interpretation framework, making the degree of security of a program a property of its semantics. This provides a comprehensive account of non-interference features for language-based security. We introduce systematic methods for extracting attackers from programs, providing domain-theoretic characterizations of the most precise attackers which cannot violate the security of a given program. These methods allow us both to compare attackers and program secrecy by comparing the corresponding abstractions in the lattice of abstract interpretations, and to design automatic program certification tools for language-based security by abstract interpretation.
引用
收藏
页码:186 / 197
页数:12
相关论文
共 50 条
  • [31] Persistent Stochastic Non-Interference
    Hillston, Jane
    Piazza, Carla
    Rossi, Sabina
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (276): : 53 - 68
  • [32] Non-interference and reciprocal adaptation
    Hulburt, EM
    ECOLOGICAL MODELLING, 2001, 136 (01) : 1 - 13
  • [33] Persistent Stochastic Non-Interference
    Hillston, Jane
    Marin, Andrea
    Piazza, Carla
    Rossi, Sabina
    FUNDAMENTA INFORMATICAE, 2021, 181 (01) : 1 - 35
  • [34] The Liberal Ethics of Non-Interference
    Mariotti, Marco
    Veneziani, Roberto
    BRITISH JOURNAL OF POLITICAL SCIENCE, 2020, 50 (02) : 567 - 584
  • [35] The Non-Interference Protection in BML
    Schubert, Aleksy
    Walukiewicz-Chrzaszcz, Daria
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 253 (05) : 113 - 127
  • [36] Panel: A genealogy of non-interference
    Ryan, PYA
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 158 - 159
  • [37] The Right to Non-intervention and Non-interference
    Aloupi, Niki
    CAMBRIDGE INTERNATIONAL LAW JOURNAL, 2015, 4 (03) : 566 - 587
  • [38] A survey on non-interference with Petri nets
    Busi, N
    Gorrieri, R
    LECTURES ON CONCURRENCY AND PETRI NETS: ADVANCES IN PETRI NETS, 2004, 3098 : 328 - 344
  • [39] A typed assembly language for non-interference
    Medel, R
    Compagnoni, A
    Bonelli, E
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2005, 3701 : 360 - 374
  • [40] Class-level Non-Interference
    Zanardini, Damiano
    NEW GENERATION COMPUTING, 2012, 30 (2-3) : 241 - 270