Model-checking trace-based information flow properties

被引:8
|
作者
D'Souza, Deepak [1 ]
Holla, Raveendra [1 ]
Raghavendra, K. R. [1 ]
Sprick, Barbara [2 ]
机构
[1] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore, Karnataka, India
[2] TU Darmdstadt, Fachbereich Informat, Darmdstadt, Germany
关键词
Model-checking; non-interference; information flow properties; security;
D O I
10.3233/JCS-2010-0400
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic technique for model-checking trace-based information flow properties for finite-state systems. We do this by showing that Mantel's Basic Security Predicates (BSPs), which were shown to be the building blocks of most trace-based properties in the literature, can be verified in an automated way for finite-state system models. We also consider the problem for the class of pushdown system models, and show that it is undecidable to check such systems for any of the trace-based information flow properties. Finally we consider a simple trace-based property we call "weak non-inference" and show that it is undecidable even for finite-state systems.
引用
收藏
页码:101 / 138
页数:38
相关论文
共 50 条
  • [1] Model-checking trace-based information flow properties for infinite-state systems
    D'Souza, Deepak
    Raghavendra, K. R.
    [J]. JOURNAL OF COMPUTER SECURITY, 2016, 24 (05) : 617 - 643
  • [2] On the Decidability of Model-Checking Information Flow Properties
    D'Souza, Deepak
    Holla, Raveendra
    Kulkarni, Janardhan
    Ramesh, Raghavendra K.
    Sprick, Barbara
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 26 - +
  • [3] Hyperdocuments as automata: Verification of trace-based browsing properties by model checking
    Stotts, PD
    Furuta, R
    Cabarrus, CR
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1998, 16 (01) : 1 - 30
  • [4] Model-checking trace event structures
    Madhusudan, P
    [J]. 18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 371 - 380
  • [5] Model-Checking Secure Information Flow for Multi-threaded Programs
    Huisman, Marieke
    Blondeel, Henri-Charles
    [J]. THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 148 - +
  • [6] Model-checking games for logics of imperfect information
    Graedel, Erich
    [J]. THEORETICAL COMPUTER SCIENCE, 2013, 493 : 2 - 14
  • [7] Model-checking based data retrieval
    Dovier, A
    Quintarelli, E
    [J]. DATABASE PROGRAMMING LANGUAGES, 2002, 2397 : 62 - 77
  • [8] TAGED Approximations for Temporal Properties Model-Checking
    Courbis, Romeo
    Heam, Pierre-Cyrille
    Kouchnarenko, Olga
    [J]. IMPLEMENTATION AND APPLICATION OF AUTOMATA, PROCEEDINGS, 2009, 5642 : 135 - 144
  • [9] Model-Checking Information Diffusion in Social Networks with PRISM
    Dennis, Louise A.
    Slavkovik, Marija
    [J]. MULTI-AGENT SYSTEMS AND AGREEMENT TECHNOLOGIES, EUMAS 2020, AT 2020, 2020, 12520 : 475 - 492
  • [10] The model-checking kit
    Schröter, C
    Schwoon, S
    Esparza, J
    [J]. APPLICATIONS AND THEORY OF PETRI NETS 2003, PROCEEDINGS, 2003, 2679 : 463 - 472