Abstract non-interference - Parameterizing non-interference by abstract interpretation

被引:102
作者
Giacobazzi, R [1 ]
Mastroeni, I [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37134 Verona, Italy
关键词
abstract interpretation; non-interference; language-based security; abstract domains;
D O I
10.1145/982962.964017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we generalize the notion of non-interference making it parametric relatively to what an attacker can analyze about the input/output information flow. The idea is to consider attackers as data-flow analyzers, whose task is to reveal properties of confidential resources by analyzing public ones. This means that no unauthorized flow of information is possible from confidential to public data, relatively to the degree of precision of an attacker. We prove that this notion can be fully specified in standard abstract interpretation framework, making the degree of security of a program a property of its semantics. This provides a comprehensive account of non-interference features for language-based security. We introduce systematic methods for extracting attackers from programs, providing domain-theoretic characterizations of the most precise attackers which cannot violate the security of a given program. These methods allow us both to compare attackers and program secrecy by comparing the corresponding abstractions in the lattice of abstract interpretations, and to design automatic program certification tools for language-based security by abstract interpretation.
引用
收藏
页码:186 / 197
页数:12
相关论文
共 40 条
[21]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[22]  
Goguen J. A., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P75
[23]   A semantic approach to secure information flow [J].
Joshi, R ;
Leino, KRM .
SCIENCE OF COMPUTER PROGRAMMING, 2000, 37 (1-3) :113-138
[24]  
LANDAUER J, 1993, P IEEE COMP SEC FDN, P65
[25]  
Laud P, 2001, LECT NOTES COMPUT SC, V2028, P77
[26]   Quantifying information flow [J].
Lowe, G .
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, :18-31
[27]  
Monniaux D, 2001, LECT NOTES COMPUT SC, V2126, P111
[28]  
Orbaek P, 1995, LECT NOTES COMPUT SC, V915, P575
[29]  
Ranzato F, 2002, LECT NOTES COMPUT SC, V2477, P411
[30]   Language-based information-flow security [J].
Sabelfeld, A ;
Myers, AC .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) :5-19