A Method of Secure Information Flow Based on Data Flow Analysis

被引:0
|
作者
Yao, Jianbo [1 ]
机构
[1] Zunyi Normal Coll, Dept Comp Sci, Zunyi, Guizhou Provinc, Peoples R China
关键词
Formal semantics; Static analysis; Data flow analysis; Secure information flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secure information flow based on data flow analysis have studied for many years. The existing methods tend to be overly conservative, giving "insecure" answers to many "secure" programs, or to be overly attention to location information leak, existing location information leak does not imply there is information leak in a program. The method described in this paper is designed to be more precise than previous syntactic methods. The soundness of the analysis is proved.
引用
收藏
页码:597 / 606
页数:10
相关论文
共 50 条
  • [1] Principles of secure information flow analysis
    Smith, Geoffrey
    [J]. Malware Detection, 2007, : 291 - 307
  • [2] Static Analysis Method of Secure Privacy Information Flow for Service Composition
    [J]. Huang, Zhi-Qiu (zqhuang@nuaa.edu.cn), 1739, Chinese Academy of Sciences (29):
  • [3] Handling encryption in an analysis for secure information flow
    Laud, P
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
  • [4] Timed secure colored Petri net based analysis of information flow
    Rakkay, Hind
    Boucheneb, Hanifa
    [J]. ANNALS OF TELECOMMUNICATIONS, 2006, 61 (11-12) : 1314 - 1346
  • [5] A Secure Data Flow Forwarding Method Based on Service Ordering Management
    Xiao, Jingxu
    Chang, Chaowen
    Wu, Ping
    Ma, Yingying
    Lu, Zicong
    [J]. ELECTRONICS, 2022, 11 (24)
  • [6] Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design
    Tai, Yu
    Hu, Wei
    Mu, Dejun
    Mao, Baolei
    Zhang, Lu
    [J]. IEEE ACCESS, 2018, 6 : 1822 - 1831
  • [7] An analysis of EEGS based on information flow with SD method
    Saiwaki, N
    Kimura, N
    Nishida, S
    [J]. 1998 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5, 1998, : 4115 - 4119
  • [8] Secure Outsourcing of Network Flow Data Analysis
    Nassar, Mohamed
    al Bouna, Bechara
    Malluhi, Qutaibah
    [J]. 2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 431 - +
  • [9] Semantics and program analysis of computationally secure information flow
    Laud, P
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 77 - 91
  • [10] Information flow analysis for fail-secure devices
    [J]. Rae, A. (arae@itee.uq.edu.au), 1600, Oxford University Press (48):