Hypercollecting Semantics and Its Application to Static Analysis of Information Flow

被引:21
作者
Assaf, Mounir [1 ]
Naumann, David A. [1 ]
Signoles, Julien [2 ]
Totel, Eric [3 ]
Tronel, Frederic [3 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] CEA LIST, Software Reliabil & Secur Lab, Saclay, France
[3] CIDRE, Cent Supelec, Rennes, France
关键词
static analysis; abstract interpretation; information flow; hyperproperties; DECLASSIFICATION POLICIES; ABSTRACT INTERPRETATION; SECURITY; PROGRAMS; LEAKAGE; DESIGN; SAFETY;
D O I
10.1145/3093333.3009889
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show how static analysis for secure information flow can be expressed and proved correct entirely within the framework of abstract interpretation. The key idea is to define a Galois connection that directly approximates the hyperproperty of interest. To enable use of such Galois connections, we introduce a fixpoint characterisation of hypercollecting semantics, i.e. a "set of sets" transformer. This makes it possible to systematically derive static analyses for hyperproperties entirely within the calculational framework of abstract interpretation. We evaluate this technique by deriving example static analyses. For qualitative information flow, we derive a dependence analysis similar to the logic of Amtoft and Banerjee (SAS' 04) and the type system of Hunt and Sands (POPL' 06). For quantitative information flow, we derive a novel cardinality analysis that bounds the leakage conveyed by a program instead of simply deciding whether it exists. This encompasses problems that are hypersafety but not k-safety. We put the framework to use and introduce variations that achieve precision rivalling the most recent and precise static analyses for information flow.
引用
收藏
页码:874 / 887
页数:14
相关论文
共 90 条
[1]   Runtime Verification of k-Safety Hyperproperties in HyperLTL [J].
Agrawal, Shreya ;
Bonakdarpour, Borzoo .
2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, :239-252
[2]   Measuring Information Leakage using Generalized Gain Functions [J].
Alvim, Mario S. ;
Chatzikokolakis, Kostas ;
Palamidessi, Catuscia ;
Smith, Geoffrey .
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, :265-279
[3]   A logic for information flow in object-oriented programs [J].
Amtoft, T ;
Bandhakavi, S ;
Banerjee, A .
ACM SIGPLAN NOTICES, 2006, 41 (01) :91-102
[4]  
Amtoft T, 2004, LECT NOTES COMPUT SC, V3148, P100
[5]  
[Anonymous], 2014, Lecture Notes in Computer Science
[6]  
[Anonymous], S REQ ENG INF SEC SR
[7]  
Askarov A., 2008, LNCS, V5283
[8]   Gradual release: Unifying declassification, encryption and key release policies [J].
Askarov, Aslan ;
Sabelfeld, Andrei .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :207-+
[9]  
Assaf M., 2016, WORKSH FDN COMP SEC
[10]  
Assaf M., 2015, THESIS U RENNES