Provably correct runtime enforcement of non-interference properties

被引:0
|
作者
Venkatakrishnan, V. N. [1 ]
Xu, Wei [2 ]
DuVarney, Daniel C. [2 ]
Sekar, R. [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
[2] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY USA
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2006年 / 4307卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in the information flow literature. However, application of non-interference to practical software systems has been limited. This is partly due to the imprecision that is inherent in static analyses that have formed the basis of previous non-interference based techniques. Runtime approaches can be significantly more accurate than static analysis, and have often been more successful in practice. However, they can only reason about explicit information flows that take place via assignments in a program. Implicit flows that take place without involving assignments, and can be inferred from the structure and/or semantics of the program, are missed by runtime techniques. This paper seeks to bridge the gap between the accuracy provided by runtime techniques and the completeness provided by static analysis techniques. In particular, we develop a hybrid technique that relies primarily on runtime information-flow tracking, but augments it with static analysis to reason about implicit flows that arise due to unexecuted paths in a program. We prove that the resulting technique preserves non-interference, while providing some of the traditional benefits of dynamic analysis such as improved accuracy.
引用
收藏
页码:332 / +
页数:3
相关论文
共 50 条
  • [1] Provably correct runtime monitoring
    School of Computer Science and Communication, KTH, Sweden
    不详
    J. Logic. Algebraic Program., 1600, 5 (304-339):
  • [2] Provably correct runtime monitoring
    Aktug, Irem
    Dam, Mads
    Gurov, Dilian
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2009, 78 (05): : 304 - 339
  • [3] Non-interference enforcement in bounded Petri nets
    Basile, Francesco
    De Tommasi, Gianmaria
    Sterle, Claudio
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 4827 - 4832
  • [4] Provably correct runtime monitoring (extended abstract)
    Aktug, Irem
    Dam, Mads
    Gurov, Dilian
    FM 2008: FORMAL METHODS, PROCEEDINGS, 2008, 5014 : 262 - +
  • [5] Abstract non-interference - Parameterizing non-interference by abstract interpretation
    Giacobazzi, R
    Mastroeni, I
    ACM SIGPLAN NOTICES, 2004, 39 (01) : 186 - 197
  • [6] NON-INTERFERENCE
    VELASCO, LMA
    COLUMBIA JOURNALISM REVIEW, 1977, 15 (05) : 62 - 62
  • [7] Rule formats for compositional non-interference properties
    Tini, S
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 60-1 : 353 - 400
  • [8] On interference and non-interference in the SMEFT
    Andreas Helset
    Michael Trott
    Journal of High Energy Physics, 2018
  • [9] On interference and non-interference in the SMEFT
    Helset, Andreas
    Trott, Michael
    JOURNAL OF HIGH ENERGY PHYSICS, 2018, (04):
  • [10] Approximate non-interference
    Di Pierro, A
    Hankin, C
    Wiklicky, H
    15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 3 - 17