The Non-Interference Protection in BML

被引:0
|
作者
Schubert, Aleksy [1 ]
Walukiewicz-Chrzaszcz, Daria [1 ]
机构
[1] Univ Warsaw, Inst Informat, Ul Banacha 2, PL-02097 Warsaw, Poland
关键词
!text type='Java']Java[!/text; bytecode; specification; BML; non-interference;
D O I
10.1016/j.entcs.2009.11.018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many information-flow type systems have been developed that allow to control the non-interference of information between the levels of classification in the Bell-LaPadula model. We present here a translation of typing information collected for bytecode programs to a bytecode program logic. This translation uses the syntax of a bytecode specification language BML. A translation of this kind allows including the check of the non-interference property in a single, unified verification framework based on a program logic and thus can be exploited within a foundational proof-carrying code infrastructure. It also provides a flexible basis for various declassification strategies that may be useful in a particular code body.
引用
收藏
页码:113 / 127
页数:15
相关论文
共 50 条
  • [31] The PER model of abstract non-interference
    Hunt, S
    Mastroeni, I
    STATIC ANALYSIS, PROCEEDINGS, 2005, 3672 : 171 - 185
  • [32] A decidable notion of timed non-interference
    Barbuti, R
    Tesei, L
    FUNDAMENTA INFORMATICAE, 2003, 54 (2-3) : 137 - 150
  • [33] The Myth of Academics' Non-interference in Legislatures
    Zelizer, Adam
    POLITICAL STUDIES REVIEW, 2022, 20 (02) : 228 - 235
  • [34] Non-Interference for Deterministic Interactive Programs
    Clark, David
    Hunt, Sebastian
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 50 - +
  • [35] Class-level Non-Interference
    Damiano Zanardini
    New Generation Computing, 2012, 30 : 241 - 270
  • [36] China Debates the Non-Interference Principle
    Zheng, Chen
    CHINESE JOURNAL OF INTERNATIONAL POLITICS, 2016, 9 (03): : 349 - 374
  • [37] Intransitive non-interference for cryptographic purposes
    Backes, M
    Pfitzmann, B
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 140 - 152
  • [38] A notion of non-interference for timed automata
    Barbuti, R
    De Francesco, N
    Santone, A
    Tesei, L
    FUNDAMENTA INFORMATICAE, 2002, 51 (1-2) : 1 - 11
  • [39] DeFi Composability as MEV Non-interference
    Bartoletti, Massimo
    Marchesin, Riccardo
    Zunino, Roberto
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 369 - 387
  • [40] Delimited Persistent Stochastic Non-Interference
    Hillston, Jane
    Marin, Andrea
    Piazza, Carla
    Rossi, Sabina
    PROCEEDINGS OF THE 12TH EAI INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION METHODOLOGIES AND TOOLS (VALUETOOLS 2019), 2019, : 135 - 142