Sensitive information leakage analysis of database code by abstract interpretation

被引:0
|
作者
Jana A. [1 ]
机构
[1] Department of Computer Science and Engineering, Indian Institute of Information Technology, Guwahati
关键词
abstract interpretation; data dependency graph; data security; database program; formal methods;
D O I
10.1504/ijsn.2023.131599
中图分类号
学科分类号
摘要
An information system stores outside data in the backend database to process them efficiently and protects sensitive data from illegitimate flow or unauthorised users. However, most information systems are made in such a way that the sensitive information stored in a database may be leaked explicitly or implicitly during data processing along with the control structure of the program to the output channels. Therefore, sensitive data leakage is one of the crucial security threat. In this paper, the main objective is to detect the illegitimate flow of confidential information in an information system. We propose a framework to detect sensitive information leakage through the data-flow paths of an information system. In particular, to compute the precise set of data-flow paths, we use the non-relational abstract property of the interval domain and the relational abstract property of the polyhedra domain that enables the framework to produce efficient security analysis results. © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:91 / 105
页数:14
相关论文
共 50 条
  • [1] Information Leakage Analysis by Abstract Interpretation
    Zanioli, Matteo
    Cortesi, Agostino
    [J]. SOFSEM 2011: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2011, 6543 : 545 - 557
  • [2] Analyzing information flow properties in assembly code by abstract interpretation
    Barbuti, R
    Bernardeschi, C
    De Francesco, N
    [J]. COMPUTER JOURNAL, 2004, 47 (01): : 25 - 45
  • [3] Extending Abstract Interpretation to Dependency Analysis of Database Applications
    Jana, Angshuman
    Halder, Raju
    Kalahasti, Abhishekh
    Ganni, Sanjivani Devi
    Cortesi, Agostino
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2020, 46 (05) : 463 - 494
  • [4] Abstract Interpretation in Code Security
    Giacobazzi, Roberto
    [J]. SEFM 2008: Sixth IEEE International Conference on Software Engineering and Formal Methods, Proceedings, 2008, : 3 - 3
  • [5] Abstract interpretation for mobile code security
    Lu, D
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    [J]. International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1068 - 1071
  • [6] Control code obfuscation by abstract interpretation
    Preda, MD
    Giacobazzi, R
    [J]. SEFM 2005: THIRD IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2005, : 301 - 310
  • [7] Abstract interpretation of database query languages
    Halder, Raju
    Cortesi, Agostino
    [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2012, 38 (02) : 123 - 157
  • [8] A method of binary code variable interval analysis based on abstract interpretation
    PLA Information Engineering University, Zhengzhou 450002, China
    [J]. Gao, H.-B. (ghb912@163.com), 1927, Science Press (35):
  • [9] Unveiling metamorphism by abstract interpretation of code properties
    Dalla Preda, Mila
    Giacobazzi, Roberto
    Debray, Saumya
    [J]. THEORETICAL COMPUTER SCIENCE, 2015, 577 : 74 - 97
  • [10] Relational abstract interpretation of arrays in assembly code
    Clément Ballabriga
    Julien Forget
    Jordy Ruiz
    [J]. Formal Methods in System Design, 2021, 59 : 103 - 135