Program Transformation for Non-interference Verification on Programs with Pointers

Mounir Assaf 1, 2 Julien Signoles 1 Frédéric Tronel 2 Eric Totel 2
1 LSL - Laboratoire Sûreté des Logiciels
DILS - Département Ingénierie Logiciels et Systèmes : DRT/LIST/DILS
2 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
IRISA-D1 - SYSTÈMES LARGE ÉCHELLE, Inria Rennes – Bretagne Atlantique , CentraleSupélec
Abstract : Novel approaches for dynamic information flow monitoring are promising since they enable permissive (accepting a large subset of executions) yet sound (rejecting all insecure executions) enforcement of non-interference. In this paper, we present a dynamic information flow monitor for a language supporting pointers. Our flow-sensitive monitor relies on prior static analysis in order to soundly enforce non-interference. We also propose a program transformation that preserves the behavior of initial programs and soundly inlines our security monitor. This program transformation enables both dynamic and static verification of non-interference.
Type de document :
Communication dans un congrès
Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer Berlin Heidelberg, IFIP Advances in Information and Communication Technology, AICT-405, pp.231-244, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_18〉
Liste complète des métadonnées

Littérature citée [21 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-00814671
Contributeur : Hal Ifip <>
Soumis le : vendredi 10 février 2017 - 11:46:39
Dernière modification le : vendredi 16 novembre 2018 - 01:38:11
Document(s) archivé(s) le : jeudi 11 mai 2017 - 13:00:19

Fichier

978-3-642-39218-4_18_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Program Transformation for Non-interference Verification on Programs with Pointers. Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer Berlin Heidelberg, IFIP Advances in Information and Communication Technology, AICT-405, pp.231-244, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_18〉. 〈hal-00814671v2〉

Partager

Métriques

Consultations de la notice

859

Téléchargements de fichiers

77