Secure information flow by self-composition

被引:179
作者
Barthe, G [1 ]
D'Argenio, PR [1 ]
Rezk, T [1 ]
机构
[1] INRIA Sophia Antipolis, Project EVEREST, F-09602 Sophia Entipolis, France
来源
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2004年
关键词
D O I
10.1109/CSFW.2004.1310735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a program assumes a separation between secret inputs and public inputs on the one hand, and secret outputs and public outputs on the other hand, and requires that the value of public outputs does not depend on the value of secret inputs. A common means to enforce non-interference is to use an information flow type system. However, such type systems are inherently imprecise, and reject many secure programs, even for simple programming languages. The purpose of this paper is to investigate logical formulations of non-interference that allow a more precise analysis of programs. It appears that such formulations are often sound and complete, and also amenable to interactive or automated verification techniques, such as theorem-proving or model-checking. We illustrate the applicability of our method in several scenarii, including a simple imperative language, a non-deterministic language, and finally a language with shared mutable data structures.
引用
收藏
页码:100 / 114
页数:15
相关论文
共 38 条
[11]  
CLARK D, 2002, J COMPUTER LANGUAGES
[12]   AUTOMATIC VERIFICATION OF FINITE-STATE CONCURRENT SYSTEMS USING TEMPORAL LOGIC SPECIFICATIONS [J].
CLARKE, EM ;
EMERSON, EA ;
SISTLA, AP .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1986, 8 (02) :244-263
[13]   SOUNDNESS AND COMPLETENESS OF AN AXIOM SYSTEM FOR PROGRAM VERIFICATION [J].
COOK, SA .
SIAM JOURNAL ON COMPUTING, 1978, 7 (01) :70-90
[14]  
DARVAS A, 2003, WORKSH ISSUES THEORY
[15]  
Den Hartog J. I., 2002, International Journal of Foundations of Computer Science, V13, P315, DOI 10.1142/S012905410200114X
[16]  
FOCARDI R, 1996, P TACAS 96 PASS, V1055, P111
[17]   Abstract non-interference - Parameterizing non-interference by abstract interpretation [J].
Giacobazzi, R ;
Mastroeni, I .
ACM SIGPLAN NOTICES, 2004, 39 (01) :186-197
[18]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[19]   SYMBOLIC MODEL CHECKING FOR REAL-TIME SYSTEMS [J].
HENZINGER, TA ;
NICOLLIN, X ;
SIFAKIS, J ;
YOVINE, S .
INFORMATION AND COMPUTATION, 1994, 111 (02) :193-244
[20]   AN AXIOMATIC BASIS FOR COMPUTER PROGRAMMING [J].
HOARE, CAR .
COMMUNICATIONS OF THE ACM, 1969, 12 (10) :576-&