Modelling declassification policies using abstract domain completeness

被引:7
|
作者
Mastroeni, Isabella [1 ]
Banerjee, Anindya [2 ]
机构
[1] Univ Verona, I-37100 Verona, Italy
[2] IMDEA Software Inst, Madrid, Spain
关键词
D O I
10.1017/S096012951100020X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper explores a three dimensional characterisation of a declassification-based non-interference policy and its consequences. Two of the dimensions consist of specifying: (a) the power of the attacker, that is, what public information a program has that an attacker can observe; and (b) what secret information a program has that needs to be protected. Both these dimensions are regulated by the third dimension: (c) the choice of program semantics, for example, trace semantics or denotational semantics, or any semantics in Cousot's semantics hierarchy. To check whether a program satisfies a non-interference policy, one can compute an abstract domain that over-approximates the information released by the policy and then check whether program execution can release more information than permitted by the policy. Counterexamples to a policy can be generated by using a variant of the Paige-Tarjan algorithm for partition refinement. Given the counterexamples, the policy can be refined so that the least amount of confidential information required for making the program secure is declassified.
引用
收藏
页码:1253 / 1299
页数:47
相关论文
共 50 条
  • [1] Inference of expressive declassification policies
    Vaughan, Jeffrey A.
    Chong, Stephen
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 180 - 195
  • [2] Domain theory in abstract interpretation: Equations, completeness and logic
    Scozzari, F
    BOLLETTINO DELLA UNIONE MATEMATICA ITALIANA, 2000, 3A : 213 - 216
  • [3] Tractable enforcement of declassification policies
    Barthe, Gilles
    Cavadini, Salvador
    Rezk, Tamara
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 83 - 97
  • [4] Adjoining declassification and attack models by abstract interpretation
    Giacobazzi, R
    Mastroeni, I
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 295 - 310
  • [5] Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution
    Micinski, Kristopher
    Fetter-Degges, Jonathan
    Jeon, Jinseong
    Foster, Jeffrey S.
    Clarkson, Michael R.
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 520 - 538
  • [6] Expressive declassification policies and modular static enforcement
    Banerjee, Anindya
    Naumann, David A.
    Rosenberg, Stan
    PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 339 - +
  • [7] Consistency Policies for Dynamic Information Systems with Declassification Flows
    Thomas, Julien A.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 87 - 101
  • [8] Stateful Declassification Policies for Event-Driven Programs
    Vanhoef, Mathy
    De Groef, Willem
    Devriese, Dominique
    Piessens, Frank
    Rezk, Tamara
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 293 - 307
  • [9] Observational Completeness on Abstract Interpretation
    Amato, Gianluca
    Scozzari, Francesca
    LOGIC, LANGUAGE, INFORMATION AND COMPUTATION, 2009, 5514 : 99 - 112
  • [10] EQUATIONAL COMPLETENESS OF ABSTRACT ALGEBRAS
    KALICKI, J
    SCOTT, DS
    BULLETIN OF THE AMERICAN MATHEMATICAL SOCIETY, 1952, 58 (06) : 626 - 626