Program Transformation for Non-interference Verification on Programs with Pointers

Mounir Assaf 1, 2 Julien Signoles 1 Frédéric Tronel 2 Eric Totel 2
1 LSL - Laboratoire Sûreté des Logiciels
LIST - Laboratoire d'Intégration des Systèmes et des Technologies : DRT/LIST
2 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
IRISA-D1 - SYSTÈMES LARGE ÉCHELLE, Inria Rennes – Bretagne Atlantique , CentraleSupélec
Abstract : Novel approaches for dynamic information flow monitoring are promising since they enable permissive (accepting a large subset of executions) yet sound (rejecting all insecure executions) enforcement of non-interference. In this paper, we present a dynamic information flow monitor for a language supporting pointers. Our flow-sensitive monitor relies on prior static analysis in order to soundly enforce non-interference. We also propose a program transformation that preserves the behavior of initial programs and soundly inlines our security monitor. This program transformation enables both dynamic and static verification of non-interference.
Document type :
Conference papers
Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer Berlin Heidelberg, IFIP Advances in Information and Communication Technology, AICT-405, pp.231-244, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_18〉
Liste complète des métadonnées

Cited literature [21 references]  Display  Hide  Download

https://hal.inria.fr/hal-00814671
Contributor : Hal Ifip <>
Submitted on : Friday, February 10, 2017 - 11:46:39 AM
Last modification on : Tuesday, September 12, 2017 - 9:22:49 AM
Document(s) archivé(s) le : Thursday, May 11, 2017 - 1:00:19 PM

File

978-3-642-39218-4_18_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Program Transformation for Non-interference Verification on Programs with Pointers. Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer Berlin Heidelberg, IFIP Advances in Information and Communication Technology, AICT-405, pp.231-244, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_18〉. 〈hal-00814671v2〉

Share

Metrics

Record views

649

Files downloads

38