Enforcing robust declassification and qualified robustness

  • Authors:
  • Andrew C. Myers;Andrei Sabelfeld;Steve Zdancewic

  • Affiliations:
  • Department of Computer Science, Cornell University;Department of Computer Science, Chalmers University of Technology, Sweden and Cornell University;Department of Computer and Information Science, University of Pennsylvania

  • Venue:
  • Journal of Computer Security - Special issue on CSFW17
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their intended function and therefore violate noninterference. To control information flow while permitting information release, some systems have a downgrading or declassification mechanism, but this creates the danger that it may cause unintentional information release. This paper shows that a robustness property can be used to characterize programs in which declassification mechanisms cannot be controlled by attackers to release more information than intended. It describes a simple way to provably enforce this robustness property through a type-based compile-time program analysis. The paper also presents a generalization of robustness that supports upgrading (endorsing) data integrity.