Time and Probability-Based Information Flow Analysis

被引:9
作者
Lanotte, Ruggero [1 ]
Maggiolo-Schettini, Andrea [2 ]
Troina, Angelo [3 ]
机构
[1] Univ Insubria, Dipartimento Sci Cultura Polit & Informaz, I-22100 Como, Italy
[2] Univ Pisa, Dipartimento Informat, I-56127 Pisa, Italy
[3] Univ Turin, Dipartimento Informat, I-10149 Turin, Italy
关键词
Probabilistic timed automata; multilevel security; information flow analysis; weak bisimulation;
D O I
10.1109/TSE.2010.4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In multilevel systems, it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely, the so-called covert channels. Initial studies of information flow analysis were performed by abstracting away from time and probability. It is already known that systems that are proven to be secure in a possibilistic framework may turn out to be insecure when time or probability is considered. Recently, work has been done in order to consider also aspects either of time or of probability, but not both. In this paper, we propose a general framework based on Probabilistic Timed Automata, where both probabilistic and timing covert channels can be studied. We define a Noninterference security property and a Nondeducibility on Composition security property, which allow expressing information flow in a timed and probabilistic setting. We then compare these properties with analogous ones defined in contexts where either time or probability or neither of them are taken into account. This permits a classification of the properties depending on their discerning power. As an application, we study a system with covert channels that we are able to discover by applying our techniques.
引用
收藏
页码:719 / 734
页数:16
相关论文
共 45 条
[1]  
Aldini A., 2004, Journal of Computer Security, V12, P191
[2]   Estimating the maximum information leakage [J].
Aldini, Alessandro ;
Di Pierro, Alessandra .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (03) :219-242
[3]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[4]  
ALUR R, 1992, P WORKSH REAL TIM TH, P28
[5]  
[Anonymous], 2000, P POPL 00
[6]  
Baier C, 1997, LECT NOTES COMPUT SC, V1254, P119
[7]  
Barber M, 2003, J ECCLESIAST HIST, V54, P137
[8]   On probabilistic timed automata [J].
Beauquier, D .
THEORETICAL COMPUTER SCIENCE, 2003, 292 (01) :65-84
[9]  
Bellman R. E., 1957, Dynamic programming. Princeton landmarks in mathematics
[10]   Quantifying information leakage in process calculi [J].
Boreale, Michele .
INFORMATION AND COMPUTATION, 2009, 207 (06) :699-725