Static analysis for the π-calculus with applications to security

被引:54
|
作者
Bodei, C
Degano, P
Nielson, F
Nielson, HR
机构
[1] Univ Pisa, Dipartimento Informat, I-56125 Pisa, Italy
[2] Tech Univ Denmark, DK-2800 Kongens Lyngby, Denmark
关键词
D O I
10.1006/inco.2000.3020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume during its execution. We present an analysis for the pi -calculus that shows how names will be bound to actual channels at run time. The result of our analysis establishes a super-set of the set of channels to which a given name may be bound and of the set of channels that may be sent along a given channel. Besides a set of rules that permits one to validate a given solution, we also offer a constructive procedure that builds solutions in low polynomial time. Applications of our analysis include establishing two simple security properties of processes. One example is that P has no leaks: P offers communication to the external environment through public channels only and confines its secret channels within itself. The other example is connected to the no read-up/no write-down property of Bell and LaPadula: once processes are given levels or security clearance, we check that a process at a high level never sends channels to processes at a lower level. (C) 2001 Academic Press.
引用
收藏
页码:68 / 92
页数:25
相关论文
共 50 条
  • [1] Static and dynamic analysis for web security in industry applications
    Wu, Raymond
    Hisada, Masayuki
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (02) : 138 - 150
  • [2] Finding security vulnerabilities in Java']Java applications with static analysis
    Livshits, VB
    Lam, MS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 271 - 286
  • [3] Improving the Security of Downloadable Java']Java Applications With Static Analysis
    Cregut, Pierre
    Alvarado, Cuihtlauac
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 141 (01) : 129 - 144
  • [4] QUALITATIVE CALCULUS AND COMPARATIVE STATIC ANALYSIS
    LLOYD, PJ
    [J]. ECONOMIC RECORD, 1969, 45 (111) : 343 - 353
  • [5] Static analysis for security
    Chess, B
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 76 - 79
  • [6] Combinatorial Method with Static Analysis for Source Code Security in Web Applications
    Higuera, Juan Ramon Bermejo
    Higuera, Javier Bermejo
    Montalvo, Juan Antonio Sicilia
    Riera, Tomas Sureda
    Argyros, Christopher I.
    Magrenan, A. Alberto
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2021, 129 (02): : 541 - 565
  • [7] SANT: Static Analysis of Native Threads for Security Vetting of Android Applications
    Andarzian, Seyed Behnam
    Ladani, Behrouz Tork
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 13 - 25
  • [8] Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications
    Farhadi, Maryam
    Haddad, Hisham
    Shahriar, Hossain
    [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 474 - 479
  • [9] Static analysis of modularity of β-reduction in the hyperbalanced λ-calculus
    Kennaway, R
    Khasidashvili, Z
    Piperno, A
    [J]. REWRITING TECHNIQUES AND APPLICATIONS, 2002, 2378 : 51 - 65
  • [10] Virtual Static Security Analyzer for Web Applications
    Brinza, Mihail
    Correia, Miguel
    Pereira, Joao
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 840 - 848