Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security 2006
DOI: 10.1145/1134744.1134750
|View full text |Cite
|
Sign up to set email alerts
|

Combining type-based analysis and model checking for finding counterexamples against non-interference

Abstract: Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often reject safe programs as ill-typed. Accordingly, users have to check whether the rejected programs indeed have insecure flows. To remedy this problem, we propose a method for automatically finding a counterexample of secure information flow (input states that actually lead to leakage of secret information). Our method is a novel combination … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 26 publications
0
30
0
Order By: Relevance
“…Unno et al (Unno et al 2006) have proposed a method for automatically finding counterexamples of secure information flow, which combines security type-based analysis for standard NI and model checking. Our context is more general, since standard NI is a particular case of DNI.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Unno et al (Unno et al 2006) have proposed a method for automatically finding counterexamples of secure information flow, which combines security type-based analysis for standard NI and model checking. Our context is more general, since standard NI is a particular case of DNI.…”
Section: Discussionmentioning
confidence: 99%
“…Also next example shows how the refinement process works , but moreover it allows us to compare our technique with the (Unno et al 2006) characterization of counterexamples to declassification policies. …”
Section: Refining Confidentiality Policiesmentioning
confidence: 99%
“…Line 2 identifies pairs of paths that witness information leaks with respect to the current candidate equivalence relation R. We discover such paths automatically by analyzing pairs of program runs, e.g., see [5], [39].…”
Section: Discovery Of Information Leaksmentioning
confidence: 99%
“…Our method can be used to synthesize such assertions. The idea that secure information flow can be verified by analyzing pairs of program runs can be found in [5], [16], [23], [38], [39].…”
Section: Introductionmentioning
confidence: 99%
“…2 Regarding 2. ), we show that the k-observable subset of the observable hyperproperties is amenable to verification via self composition [5,13,30,26,31], much like k-safety hyperproperties, and identify which QIF problems belong to that family. We also show that the hardest of the QIF problems (but nevertheless one of the most popular) can only be classified as a general liveness hyperproperty, suggesting that liveness hyperproperty is a quite permissive class of hyperproperties.…”
Section: Introductionmentioning
confidence: 99%