Non-termination and secure information flow

被引:0
|
作者
Smith, Geoffrey [1 ]
Alpizar, Rafael [1 ]
机构
[1] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
基金
美国国家科学基金会;
关键词
PROBABILISTIC NONINTERFERENCE;
D O I
10.1017/S0960129511000181
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In secure information flow analysis, the classic Denning restrictions allow a program's termination to be affected by the values of its H variables, resulting in potential information leaks. In an effort to quantify such leaks, in this paper we study a simple imperative language with random assignments. As a thought experiment, we propose a 'stripping' operation on programs, which eliminates all 'high computation', and prove the fundamental property that stripping cannot decrease the probability of any low outcome. To prove this property, we first introduce a new notion of fast probabilistic simulation on Markov chains and show that it implies a key reachability property. Viewing the stripping function as a binary relation, we then prove that stripping is a fast simulation. As an application, we prove that, under the Denning restrictions, well-typed probabilistic programs are guaranteed to satisfy an approximate probabilistic non-interference property, provided that their probability of non-termination is small.
引用
收藏
页码:1183 / 1205
页数:23
相关论文
共 50 条
  • [41] Proving Non-Termination by Acceleration Driven Clause Learning (Short Paper)
    Frohn, Florian
    Giesl, Juergen
    AUTOMATED DEDUCTION, CADE 29, 2023, 14132 : 220 - 233
  • [42] Data-driven Recurrent Set Learning For Non-termination Analysis
    Han, Zhilei
    He, Fei
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 1303 - 1315
  • [43] Predicting acute termination and non-termination during ablation of human atrial fibrillation using quantitative indices
    Kappel, Cole
    Reiss, Michael
    Rodrigo, Miguel
    Ganesan, Prasanth
    Narayan, Sanjiv. M. M.
    Rappel, Wouter-Jan
    FRONTIERS IN PHYSIOLOGY, 2022, 13
  • [44] Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
    Kashyap, Vineeth
    Wiedermann, Ben
    Hardekopf, Ben
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 413 - 428
  • [45] EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software
    Zhang, Yao
    Xie, Xiaofei
    Li, Yi
    Chen, Sen
    Zhang, Cen
    Li, Xiaohong
    2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 686 - 697
  • [46] Non-termination Analysis of Polynomial Programs by Solving Semi-Algebraic Systems
    Zhao, Xiaoyan
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 205 - 211
  • [47] Non-termination of yrast bands at maximum configuration spin in 73Kr
    Steinhardt, T.
    Eberth, J.
    Thelen, O.
    Schnare, H.
    Schwengner, R.
    Plettner, C.
    Kaeubler, L.
    Doenau, F.
    Algora, A.
    de Angelis, G.
    Gadea, A.
    Napoli, D. R.
    Hausmann, M.
    Jungclaus, A.
    Lieb, K. P.
    Mueller, G. A.
    Jenkins, D. G.
    Wadsworth, R.
    Wilson, A. N.
    PHYSICAL REVIEW C, 2010, 81 (05):
  • [48] Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects
    Shi, Xiuhan
    Xie, Xiaofei
    Li, Yi
    Zhang, Yao
    Chen, Sen
    Li, Xiaohong
    PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 256 - 268
  • [49] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [50] Arrows for secure information flow
    Li, Peng
    Zdancewic, Steve
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994