A Method of Secure Information Flow Based on Data Flow Analysis

被引:0
|
作者
Yao, Jianbo [1 ]
机构
[1] Zunyi Normal Coll, Dept Comp Sci, Zunyi, Guizhou Provinc, Peoples R China
关键词
Formal semantics; Static analysis; Data flow analysis; Secure information flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secure information flow based on data flow analysis have studied for many years. The existing methods tend to be overly conservative, giving "insecure" answers to many "secure" programs, or to be overly attention to location information leak, existing location information leak does not imply there is information leak in a program. The method described in this paper is designed to be more precise than previous syntactic methods. The soundness of the analysis is proved.
引用
收藏
页码:597 / 606
页数:10
相关论文
共 50 条
  • [21] DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control
    Lu, Jintian
    Sun, Jiakun
    Xiao, Ruizhi
    Jin, Shuyuan
    [J]. COMPUTERS & SECURITY, 2022, 117
  • [22] DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control
    Lu, Jintian
    Sun, Jiakun
    Xiao, Ruizhi
    Jin, Shuyuan
    [J]. Computers and Security, 2022, 117
  • [23] Quantitative analysis of secure information flow via Probabilistic Semantics
    Mu, Chunyan
    Clark, David
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 49 - 57
  • [24] Secure Information Flow Analysis Using the PRISM Model Checker
    Noroozi, Ali A.
    Salehi, Khayyam
    Karimpour, Jaber
    Isazadeh, Ayaz
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 154 - 172
  • [25] History-based access control and secure information flow
    Banerjee, A
    Naumann, DA
    [J]. CONSTRUCTION AND ANALYSIS OF SAFE, SECURE, AND INTEROPERABLE SMART DEVICES, 2005, 3362 : 27 - 48
  • [26] Stack-based access control and secure information flow
    Banerjee, A
    Naumann, DA
    [J]. JOURNAL OF FUNCTIONAL PROGRAMMING, 2005, 15 : 131 - 177
  • [27] A Mixed Static Analysis Method based on Event Flow and Data Flow in Distributed Debugger
    Li, Qingshan
    Chen, Wei
    Wang, Xin
    Chu, Hua
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 307 - 314
  • [28] Array operations for secure information flow
    Yao, JB
    Li, JS
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3884 - 3892
  • [29] Secure Information Flow for Distributed Systems
    Alpizar, Rafael
    Smith, Geoffrey
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 126 - 140
  • [30] Secure Information Flow as a Safety Property
    Boudol, Gerard
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 20 - 34