Modelling declassification policies using abstract domain completeness

نویسندگان

  • Isabella Mastroeni
  • Anindya Banerjee
چکیده

Domain Completeness Isabella Mastroeni and Anindya Banerjee a Università di Verona, Verona, Italy e-mail:[email protected] b IMDEA Software Institute, Madrid, Spain e-mail: [email protected] Received 13 October 2010 This paper explores a three dimensional characterization of a declassification-based noninterference policy and its consequences. Two of the dimensions consist in specifying (a) the power of the attacker, that is, what public information an attacker can observe of a program, and (b) what secret information of a program needs to be protected. Both these dimensions are regulated by the third dimension, (c) the choice of program semantics, for example, trace semantics or denotational semantics, or, for instance, any semantics in Cousot’s semantics hierarchy. To check whether a program satisfies a noninterference policy one can compute an abstract domain that over-approximates the information released by the policy and can subsequently check whether program execution may release more information than what is permitted by the policy. Counterexamples to a policy can be generated by using a variant of the Paige-Tarjan algorithm for partition refinement. Given the counterexamples the policy can be refined so that the least amount of confidential information necessary for making the program secure is declassified.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adjoining Declassification and Attack Models by Abstract Interpretation

domain completeness Let < A, α, γ, C > a Galois insertion. [Cousot & Cousot ’77,’79] f : C −→ C, f = α ◦ f ◦ γ : A −→ A (b.c.a. of f) and ρ=γ ◦ α α(x) x f αf(x) =fα(x) ⊥ ⊥ a > > a ρ correct for f f α f(x) αf(x) Adjoining Declassification and Attack Models by Abstract Interpretation – p.5/19 Abstract domain completeness Let < A, α, γ, C > a Galois insertion. [Cousot & Cousot ’77,’79] f : C −→ C,...

متن کامل

A Dependent Type Theory for Verification of Information Flow and Access Control Policies

We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. We show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-o...

متن کامل

Designing a Security-typed Language with Certificate-based Declassification

This paper presents the design of a programming language that supports information-flow security policies and certificate-based declassification. The language uses monadic information-flow annotations in the style of Abadi et al.’s dependency core calculus, and has an effects system and fixpoints. The type system conflates security concepts such as labels, principals, and privileges with abstra...

متن کامل

What You Lose is What You Leak: Information Leakage in Declassification Policies

This paper suggests the following approach for checking whether a program satisfies an information flow policy that may declassify secret information: (a) Compute a finite abstract domain that over-approximates the information released by the policy and (b) Check whether program execution may release more information than what is permitted by the policy by completing the finite abstract domain ...

متن کامل

A Design for a Security-Typed Language with Certificate-Based Declassification

This paper presents a calculus that supports information-flow security policies and certificate-based declassification. The decentralized label model and its downgrading mechanisms are concisely expressed in the polymorphic lambda calculus with subtyping (System F≾). We prove a conditioned version of the noninterference theorem such that authorization for declassification is justified by digita...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Mathematical Structures in Computer Science

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2011