Secure information flow by self-composition

被引:179
作者
Barthe, G [1 ]
D'Argenio, PR [1 ]
Rezk, T [1 ]
机构
[1] INRIA Sophia Antipolis, Project EVEREST, F-09602 Sophia Entipolis, France
来源
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2004年
关键词
D O I
10.1109/CSFW.2004.1310735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a program assumes a separation between secret inputs and public inputs on the one hand, and secret outputs and public outputs on the other hand, and requires that the value of public outputs does not depend on the value of secret inputs. A common means to enforce non-interference is to use an information flow type system. However, such type systems are inherently imprecise, and reject many secure programs, even for simple programming languages. The purpose of this paper is to investigate logical formulations of non-interference that allow a more precise analysis of programs. It appears that such formulations are often sound and complete, and also amenable to interactive or automated verification techniques, such as theorem-proving or model-checking. We illustrate the applicability of our method in several scenarii, including a simple imperative language, a non-deterministic language, and finally a language with shared mutable data structures.
引用
收藏
页码:100 / 114
页数:15
相关论文
共 38 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]  
Abadi Martin., POPL'99, P147
[3]  
[Anonymous], 1995, J COMPUT SECUR, DOI DOI 10.3233/JCS-1994/1995-3103
[4]  
[Anonymous], POPL 2001
[5]  
[Anonymous], P ACM S PRINC PROGR
[6]  
BANERJEE A, 2003, UNPUB
[7]  
BIANCO A, 1995, LNCS, V1026, P499, DOI [DOI 10.1007/3-540-60692-0, DOI 10.1007/3-540-60692-0_70]
[8]   Noninterference for concurrent programs and thread systems [J].
Boudol, G ;
Castellani, I .
THEORETICAL COMPUTER SCIENCE, 2002, 281 (1-2) :109-130
[9]  
Burdy L, 2003, LECT NOTES COMPUT SC, V2805, P422
[10]  
BURDY L, 2003, P FMICS 03, V80