Secure information flow as a safety problem

被引:0
|
作者
Terauchi, T
Aiken, A
机构
[1] Univ Calif Berkeley, EECS Dept, Berkeley, CA 94720 USA
[2] Stanford Univ, Comp Sci Dept, Stanford, CA USA
来源
STATIC ANALYSIS, PROCEEDINGS | 2005年 / 3672卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the term "self-composition" to describe this reduction. This paper generalizes the self-compositional approach with a form of information downgrading recently proposed by Li and Zdancewic. We also identify a problem with applying the self-compositional approach in practice, and we present a solution to this problem that makes use of more traditional type-based approaches. The result is a framework that combines the best of both worlds, i.e., better than traditional type-based approaches and better than the self-compositional approach.
引用
收藏
页码:352 / 367
页数:16
相关论文
共 50 条
  • [1] Secure Information Flow as a Safety Property
    Boudol, Gerard
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 20 - 34
  • [2] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [3] Arrows for secure information flow
    Li, Peng
    Zdancewic, Steve
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994
  • [4] Information flow in secure contexts
    Bossi, Annalisa
    Macedonio, Damiano
    Piazza, Carla
    Rossi, Sabina
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
  • [5] Information Flow Secure CAmkES
    Goyal, Amit
    Garg, Akshat
    Gour, Digvijaysingh
    Shyamasundar, R. K.
    Sivakumar, G.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
  • [6] Secure information flow and CPS
    Zdancewic, S
    Myers, AC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
  • [7] Compositionality of Secure Information Flow
    Palamidessi, Catuscia
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
  • [8] Principles of secure information flow analysis
    Smith, Geoffrey
    Malware Detection, 2007, : 291 - 307
  • [9] Array operations for secure information flow
    Yao, JB
    Li, JS
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3884 - 3892
  • [10] Secure Information Flow for Distributed Systems
    Alpizar, Rafael
    Smith, Geoffrey
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 126 - 140