Provably correct runtime enforcement of non-interference properties

被引:0
|
作者
Venkatakrishnan, V. N. [1 ]
Xu, Wei [2 ]
DuVarney, Daniel C. [2 ]
Sekar, R. [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
[2] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY USA
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2006年 / 4307卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in the information flow literature. However, application of non-interference to practical software systems has been limited. This is partly due to the imprecision that is inherent in static analyses that have formed the basis of previous non-interference based techniques. Runtime approaches can be significantly more accurate than static analysis, and have often been more successful in practice. However, they can only reason about explicit information flows that take place via assignments in a program. Implicit flows that take place without involving assignments, and can be inferred from the structure and/or semantics of the program, are missed by runtime techniques. This paper seeks to bridge the gap between the accuracy provided by runtime techniques and the completeness provided by static analysis techniques. In particular, we develop a hybrid technique that relies primarily on runtime information-flow tracking, but augments it with static analysis to reason about implicit flows that arise due to unexecuted paths in a program. We prove that the resulting technique preserves non-interference, while providing some of the traditional benefits of dynamic analysis such as improved accuracy.
引用
收藏
页码:332 / +
页数:3
相关论文
共 50 条
  • [21] Process algebra and non-interference
    Ryan, PYA
    Schneider, SA
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 214 - 227
  • [22] Computational probabilistic non-interference
    Backes, M
    Pfitzmann, B
    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 1 - 23
  • [23] Non-interference, who needs it?
    Ryan, P
    Mellon, C
    McLean, J
    14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 237 - 238
  • [24] ‘Non-interference’ implies equality
    Marco Mariotti
    Roberto Veneziani
    Social Choice and Welfare, 2009, 32 : 123 - 128
  • [25] Autonomy, Competence and Non-interference
    Roberts, Joseph T. F.
    HEC FORUM, 2018, 30 (03) : 235 - 252
  • [26] On the Runtime Enforcement of Timed Properties
    Falcone, Ylies
    Pinisetty, Srinivas
    RUNTIME VERIFICATION, RV 2019, 2019, 11757 : 48 - 69
  • [27] Persistent Stochastic Non-Interference
    Hillston, Jane
    Piazza, Carla
    Rossi, Sabina
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (276): : 53 - 68
  • [28] Non-interference and reciprocal adaptation
    Hulburt, EM
    ECOLOGICAL MODELLING, 2001, 136 (01) : 1 - 13
  • [29] Persistent Stochastic Non-Interference
    Hillston, Jane
    Marin, Andrea
    Piazza, Carla
    Rossi, Sabina
    FUNDAMENTA INFORMATICAE, 2021, 181 (01) : 1 - 35
  • [30] The Liberal Ethics of Non-Interference
    Mariotti, Marco
    Veneziani, Roberto
    BRITISH JOURNAL OF POLITICAL SCIENCE, 2020, 50 (02) : 567 - 584