Automata-based Confidentiality Monitoring

Gurvan Le Guernic 1, 2 Anindya Banerjee 1 Thomas Jensen 2 David Schmidt 1
2 Lande - Logiciel : ANalyse et DEveloppement
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of non-interference, this paper considers dynamic, automaton-based, monitoring of information flow for a single execution of a sequential program. The monitoring mechanism is based on a combination of dynamic and static analyses. During program execution, abstractions of program events are sent to the automaton, which uses the abstractions to track information flows and to control the execution by forbidding or editing dangerous actions. The mechanism proposed is proved to be sound, to preserve executions of well-typed programs (in the security type system of Volpano, Smith and Irvine), and to preserve some safe executions of ill-typed programs.
Complete list of metadatas

https://hal.inria.fr/inria-00130210
Contributor : Gurvan Le Guernic <>
Submitted on : Friday, February 9, 2007 - 6:09:24 PM
Last modification on : Friday, November 16, 2018 - 1:24:17 AM
Long-term archiving on : Friday, September 21, 2012 - 11:15:09 AM

File

automatonBasedNiMonitoring.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : inria-00130210, version 1

Citation

Gurvan Le Guernic, Anindya Banerjee, Thomas Jensen, David Schmidt. Automata-based Confidentiality Monitoring. ASIAN'06: 11th Annual Asian Computing Science Conference, National Institute of Informatics, Dec 2006, Tokyo/Japan. ⟨inria-00130210⟩

Share

Metrics

Record views

480

Files downloads

663