Detecting and Debugging Insecure Information Flows

  • Authors:
  • Wes Masri;Andy Podgurski;David Leon

  • Affiliations:
  • Case Western Reserve University, Cleveland, OH;Case Western Reserve University, Cleveland, OH;Case Western Reserve University, Cleveland, OH

  • Venue:
  • ISSRE '04 Proceedings of the 15th International Symposium on Software Reliability Engineering
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

A new approach to dynamic information flow analysis is presented that can be used to detect and debug insecure flows in programs. It can be applied offline to validate and debug a program against an information flow policy, or, when fast response is not critical, it can be applied online to prevent illegal flows in deployed programs. Since dynamic analysis alone is inherently unable to detect implicit information flows, our approach incorporates a static preprocessing phase that permits detection of most implicit flows at runtime, in addition to explicit ones. To support interactive debugging of insecure flows, it also incorporates a new forward computing algorithm for dynamic slicing, which is more precise than previous forward computing algorithms and is not restricted to programs with structured control flow. A prototype tool implementing the proposed approach has been developed for Java byte code programs. Case studies in which this tool was applied to several subject programs are described.