A multi-compositional enforcement on information flow security

  • Authors:
  • Cong Sun;Ennan Zhai;Zhong Chen;Jianfeng Ma

  • Affiliations:
  • Key Lab. of Computer Networks and Information Security, Xidian Univ., MoE, China and Key Lab. of High Confidence Software Technologies, Peking Univ., MoE, China and Key Lab. of Network and Softwar ...;Institute of Software, Chinese Academy of Sciences;Key Lab. of High Confidence Software Technologies, Peking Univ., MoE, China and Key Lab. of Network and Software Security Assurance;Key Lab. of Computer Networks and Information Security, Xidian Univ., MoE, China

  • Venue:
  • ICICS'11 Proceedings of the 13th international conference on Information and communications security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Interactive/Reactive computational model is known to be proper abstraction of many pervasively used systems, such as clientside web-based applications. The critical task of information flow control mechanisms aims to determine whether the interactive program can guarantee the confidentiality of secret data. We propose an efficient and flow-sensitive static analysis to enforce information flow policy on program with interactive I/Os. A reachability analysis is performed on the abstract model after a form of transformation, called multi-composition, to check the conformance with the policy. In the multi-composition we develop a store-match pattern to avoid duplicating the I/O channels in the model, and use the principle of secure multi-execution to generalize the security lattice model which is supported by other approaches based on automated verification. We also extend our approach to support a stronger version of termination-insensitive noninterference. The results of preliminary experiments show that our approach is more precise than existing flow-sensitive analysis and the cost of verification is reduced through the store-match pattern.