Checking security policies through an enhanced Control Flow Analysis

被引:4
|
作者
Bodei, Chiara [1 ]
Degano, Pierpaolo [1 ]
Priami, Corrado [2 ]
机构
[1] Univ Pisa, Dipartimento Informat, Via F Buonarroti 2, I-56127 Pisa, Italy
[2] Univ Trento, Dipartimento Informat & Telecomunicaz, I-1438050 Povo, TN, Italy
关键词
Control Flow Analysis; security; access control policies; enhanced semantics;
D O I
10.3233/JCS-2005-13103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile processes, expressed in (a variant of) the pi-calculus. Our analysis of a system is able to describe the essential behaviour of each sub-system, tracking where and between which sub-processes communications may occur. This means that we can safely approximate the behaviour of a system plugged in a larger and mainly unknown context, without explicitly analysing it. Several possible properties can be investigated using this approximation, among which some related to confidentiality and to access control policies.
引用
收藏
页码:49 / 85
页数:37
相关论文
共 50 条
  • [41] Qualitative and Quantitative Analysis with Scheduling Policies in Model Checking
    Nhat-Hoa Tran
    Chiba, Yuki
    Aoki, Toshiaki
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1873 - 1880
  • [42] A model for checking consistency in access control policies for network management
    Cridlig, Vincent
    State, Radu
    Festor, Olivier
    2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 11 - +
  • [43] Security Path Verification Through Joint Information Flow Analysis
    Hu, Wei
    Wang, Xinmu
    Mu, Dejun
    2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018), 2018, : 415 - 418
  • [44] Analyzing Hardware Security Properties of Processors through Model Checking
    Kumar, Binod
    Jaiswal, Akshay Kumar
    Vineesh, V. S.
    Shinde, Rushikesh
    2020 33RD INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2020 19TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2020, : 107 - 112
  • [45] Technique for Enhanced Flow Control Efficiency Through Thermal Actuation
    Hirsch, Damian
    Shmilovich, Arvin
    Whalen, Edward
    Gharib, Morteza
    AIAA JOURNAL, 2018, 56 (09) : 3399 - 3413
  • [46] Scheduling Fair Resource Allocation Policies for Cloud Computing through Flow Control
    Souravlas, Stavros
    Katsavounis, Stefanos
    ELECTRONICS, 2019, 8 (11)
  • [47] An improved CFCSS Control Flow Checking Algorithm
    Wu, Yan-Xia
    Gu, Guo-Chang
    Wang, Ke-Hui
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 284 - +
  • [48] Algebraic techniques for the optimisation of control flow checking
    Noubir, G
    Choueiry, BY
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT COMPUTING, 1996, : 128 - 137
  • [49] Control-flow checking by software signatures
    Oh, N
    Shirvani, PP
    McCluskey, EJ
    IEEE TRANSACTIONS ON RELIABILITY, 2002, 51 (01) : 111 - 122
  • [50] Survey of control flow checking using software
    School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China
    不详
    Harbin Gongye Daxue Xuebao, 2008, 3 (407-412+482):