Automaton-based Confidentiality Monitoring of Concurrent Programs

Gurvan Le Guernic 1
1 Lande - Logiciel : ANalyse et DEveloppement
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noninterference, this paper considers dynamic, au\-to\-maton-based, monitoring of information flow for a single execution of a concurrent program. The monitoring mechanism is based on a combination of dynamic and static analyses. During program execution, abstractions of program events are sent to the automaton, which uses the abstractions to track information flows and to control the execution by forbidding or editing dangerous actions. All monitored executions are proved to be noninterfering (soundness) and executions of programs that are well-typed in a security type system similar to the one of Smith and Volpano~\cite{Smith:Volpano:MultiThreaded} are proved to be unaltered by the monitor (partial transparency).
Type de document :
Communication dans un congrès
Computer Security Foundations Symposium, Jul 2007, S. Servolo island, Venice, Italy, IEEE Computer Society Press, 2007, Proceedings of the 20th IEEE Computer Security Foundations Symposium
Liste complète des métadonnées

Littérature citée [26 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00161019
Contributeur : Gurvan Le Guernic <>
Soumis le : lundi 9 juillet 2007 - 16:24:08
Dernière modification le : mercredi 16 mai 2018 - 11:23:03
Document(s) archivé(s) le : lundi 24 septembre 2012 - 11:01:55

Fichier

abnim_concurrent.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : inria-00161019, version 1

Collections

Citation

Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs. Computer Security Foundations Symposium, Jul 2007, S. Servolo island, Venice, Italy, IEEE Computer Society Press, 2007, Proceedings of the 20th IEEE Computer Security Foundations Symposium. 〈inria-00161019〉

Partager

Métriques

Consultations de la notice

146

Téléchargements de fichiers

233