2013
DOI: 10.1007/978-3-642-38197-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Types vs. PDGs in Information Flow Analysis

Abstract: Abstract. Type-based and PDG-based information flow analysis techniques are currently developed independently in a competing manner, with different strengths regarding coverage of language features and security policies. In this article, we study the relationship between these two approaches. One key insight is that a type-based information flow analysis need not be less precise than a PDG-based analysis. For proving this result we establish a formal connection between the two approaches which can also be used… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 31 publications
0
2
0
1
Order By: Relevance
“…Another class of approaches for information flow control are based on type systems [26,19]. They can have the same scalability and precision as SDG-based approaches [20], though most type systems have higher scalability but lower precision. They enforce secure information flow by assigning a security type (e.g., high or low) to the program variables and then checking whether the expressions in the program conform to the type system.…”
Section: Related Workmentioning
confidence: 99%
“…Another class of approaches for information flow control are based on type systems [26,19]. They can have the same scalability and precision as SDG-based approaches [20], though most type systems have higher scalability but lower precision. They enforce secure information flow by assigning a security type (e.g., high or low) to the program variables and then checking whether the expressions in the program conform to the type system.…”
Section: Related Workmentioning
confidence: 99%
“…Observe that the preciseness of the dependence graph depends on how precisely we can identify the overlapping of databaseparts by various database operations (add, upd, del). Let us extend the definitions on dependence graphs from [21] to the case of DOPDG. Table 1 depicts the abstract syntax of database applications defined in [12], where e = e 1 , e 2 , .…”
Section: Database-oriented Program Dependence Graph (Dopdg)mentioning
confidence: 99%
“…Механизмы проверки чаще всего реализуются на языковом уровне в виде отдельных видов статического (динамического) анализа. Особую популярность приобрели методы статического анализа информационных потоков на основе безопасных систем типов [9,10]. Они позволяют применить принцип безопасной композиции, что существенно в виду большого объема проверяемого кода промышленных приложений.…”
Section: Introductionunclassified