2000
DOI: 10.1145/357766.351245
|View full text |Cite
|
Sign up to set email alerts
|

Information flow inference for free

Abstract: This paper shows how to systematically extend an arbitrary type system with dependency information, and how soundness and non-interference proofs for the new system may rely upon, rather than duplicate, the soundness proof of the original system. This allows enriching virtually any of the type systems known today with information flow analysis, while requiring only a minimal proof effort.Our approach is based on an untyped operational semantics for a labelled calculus akin to core ML. Thus, it is simple, and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2001
2001
2007
2007

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(73 citation statements)
references
References 20 publications
0
73
0
Order By: Relevance
“…The vast majority of research on non-interference concerns static analyses and involves type systems [3,27]. Some "real size" languages together with security type system have been developed (for example, JFlow/JIF [5] and FlowCaml [6]).…”
Section: Resultsmentioning
confidence: 99%
“…The vast majority of research on non-interference concerns static analyses and involves type systems [3,27]. Some "real size" languages together with security type system have been developed (for example, JFlow/JIF [5] and FlowCaml [6]).…”
Section: Resultsmentioning
confidence: 99%
“…Type-based analysis for secure information flow is applied to various languages such as simple imperative languages [20,21] and functional languages [4,14,15], object-oriented languages [9], and concurrent languages [6,7,17]. They are useful for conservatively proving that a program has secure information flow, but not at all for disproving it.…”
Section: Related Workmentioning
confidence: 99%
“…A number of type systems for secure information flow have recently been proposed [8,9,14,15,20,21]. Those type systems guarantee that well-typed programs never leak secret information, so that the problem of checking secure information flow is reduced to the problem of type checking.…”
Section: Introductionmentioning
confidence: 99%
“…This model works well for systems incorporating mutual distrust, because labels specify on whose behalf the security policy operates. In particular, label ownership is used to control the use of selective declassification [34], a feature needed for realistic applications of information-flow control.…”
Section: Security Labelsmentioning
confidence: 99%
“…Information flow policies have been enforced using both dynamic [14,25] and language-based techniques [9,27,28,13,53,18,34,35,3,38]. Jif [29,31] is a full-scale implementation of a security-typed language.…”
Section: Related Workmentioning
confidence: 99%