2006
DOI: 10.1007/11935308_24
|View full text |Cite
|
Sign up to set email alerts
|

Provably Correct Runtime Enforcement of Non-interference Properties

Abstract: Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in the information flow literature. However, application of non-interference to practical software systems has been limited. This is partly due to the imprecision that is inherent in static analyses that have formed the basis of previous non-interference based techniques. Runtime approaches can be significantly more accurate than static analysis, and have often been more successful in practice. However, they can o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…Mechanisms by Venkatakrishnan et al [48], Le Guernic et al [28], [27], and Shroff et al [45] combine dynamic and static checks. The mechanisms by Le Guernic et al for sequential [28] and concurrent [27] programs are flowsensitive.…”
Section: Related Workmentioning
confidence: 99%
“…Mechanisms by Venkatakrishnan et al [48], Le Guernic et al [28], [27], and Shroff et al [45] combine dynamic and static checks. The mechanisms by Le Guernic et al for sequential [28] and concurrent [27] programs are flowsensitive.…”
Section: Related Workmentioning
confidence: 99%
“…Some perform static pre-analyzes, i.e., before the execution [13,21,25], or code inlining [12,6,23,29]. In other cases, the static analysis is triggered at runtime by the monitor [22,32,27,19]. A value sensitivity criterion can be applied in the static analysis of this second group.…”
Section: S-ifmentioning
confidence: 99%
“…However, a roadblock on the way to wider adoption of these tools has been their limited permissiveness i.e secure programs are falsely rejected due to over-approximations. Flow-, context-, and object-sensitive techniques [17] have been suggested to improve the precision of static information flow control, and dynamic and hybrid monitors [22,32,27,20,19] have been explored to leverage the knowledge about the current run for precision. Dynamic and hybrid techniques are particularly promising for highly dynamic languages such as JavaScript.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, prior methods of detecting noninterference have typically required access to the program running the system in question. These analyses either used the program for directly analyzing its code (see [9] for a survey), for running an instrumented version of the system (e.g., [10][11][12][13]), or for simulating multiple executions of the system (e.g., [14][15][16]). Traditionally, the requirement of access to the program has not been problematic since the analysis has been motivated as a tool for software engineers securing a program that they have designed.…”
Section: Prior Workmentioning
confidence: 99%