A Method of Secure Information Flow Based on Data Flow Analysis

被引:0
|
作者
Yao, Jianbo [1 ]
机构
[1] Zunyi Normal Coll, Dept Comp Sci, Zunyi, Guizhou Provinc, Peoples R China
关键词
Formal semantics; Static analysis; Data flow analysis; Secure information flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secure information flow based on data flow analysis have studied for many years. The existing methods tend to be overly conservative, giving "insecure" answers to many "secure" programs, or to be overly attention to location information leak, existing location information leak does not imply there is information leak in a program. The method described in this paper is designed to be more precise than previous syntactic methods. The soundness of the analysis is proved.
引用
收藏
页码:597 / 606
页数:10
相关论文
共 50 条
  • [31] Mediating secure information flow policies
    Zhang, Guo-Qiang
    [J]. INFORMATION AND COMPUTATION, 2007, 205 (09) : 1413 - 1425
  • [32] SPLinux*: An Information Flow Secure Linux
    Vyas, Parjanya
    Shyamasundar, Rk
    Patil, Bhagyesh
    Borse, Snehal
    Sen, Satyaki
    [J]. 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1603 - 1612
  • [33] Verifying a secure information flow analyzer
    Naumann, DA
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2005, 3603 : 211 - 226
  • [34] A Policy Model for Secure Information Flow
    Adetoye, Adedayo O.
    Badii, Atta
    [J]. FOUNDATIONS AND APPLICATIONS OF SECURITY ANALYSIS, 2009, 5511 : 1 - 17
  • [35] Secure information flow as a safety problem
    Terauchi, T
    Aiken, A
    [J]. STATIC ANALYSIS, PROCEEDINGS, 2005, 3672 : 352 - 367
  • [36] Secure information flow and program logics
    Beringer, Lennart
    Hofmann, Martin
    [J]. 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 233 - +
  • [37] A semantic approach to secure information flow
    Joshi, R
    Leino, KRM
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2000, 37 (1-3) : 113 - 138
  • [38] Secure information sharing in social agent interactions using information flow analysis
    Bijani, Shahriar
    Robertson, David
    Aspinall, David
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2018, 70 : 52 - 66
  • [39] Detection of information leak by data flow analysis
    Doh, KG
    Shin, SC
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (08) : 66 - 71
  • [40] Verifying Data Secure Flow in AUTOSAR Models by Static Analysis
    Bernardeschi, Cinzia
    Di Natale, Marco
    Dini, Gianluca
    Palmieri, Maurizio
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 704 - 713