Information Flow in Object-Oriented Software

被引:9
作者
Beckert, Bernhard [1 ]
Bruns, Daniel [1 ]
Klebanov, Vladimir [1 ]
Scheben, Christoph [1 ]
Schmitt, Peter H. [1 ]
Ulbrich, Mattias [1 ]
机构
[1] Karlsruhe Inst Technol, Dept Informat, D-76131 Karlsruhe, Germany
来源
LOGIC-BASED PROGRAM SYNTHESIS AND TRANSFORMATION, LOPSTR 2013 | 2014年 / 8901卷
关键词
D O I
10.1007/978-3-319-14125-1_2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper contributes to the investigation of object-sensitive information flow properties for sequential Java, i.e., properties that take into account information leakage through objects, as opposed to primitive values. We present two improvements to a popular object-sensitive non-interference property. Both reduce the burden on analysis and monitoring tools. We present a formalization of this property in a program logic - JavaDL in our case - which allows using an existing tool without requiring program modification. The third contribution is a novel finegrained specification methodology. In our approach, arbitrary JavaDL terms (read 'side-effect-free Java expressions') may be assigned a security level - in contrast to security labels being attached to fields and variables only.
引用
收藏
页码:19 / 37
页数:19
相关论文
共 33 条
[1]   A logic for information flow in object-oriented programs [J].
Amtoft, T ;
Bandhakavi, S ;
Banerjee, A .
ACM SIGPLAN NOTICES, 2006, 41 (01) :91-102
[2]  
Amtoft T, 2004, LECT NOTES COMPUT SC, V3148, P100
[3]  
Banerjee A., 2002, P CSFW
[4]   Expressive declassification policies and modular static enforcement [J].
Banerjee, Anindya ;
Naumann, David A. ;
Rosenberg, Stan .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :339-+
[5]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[6]  
Barthe G., 2013, MATH STRUCTURES COMP, V1-50, P4
[7]  
Beckert B., 2013, 201314 KIT
[8]  
Beckert Bernhard., 2007, LNCS, V4334
[9]   Secure information flow and program logics [J].
Beringer, Lennart ;
Hofmann, Martin .
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, :233-+
[10]  
Bubel R, 2009, LECT NOTES COMPUT SC, V5751, P247