2009
DOI: 10.1007/s10207-009-0086-1
|View full text |Cite
|
Sign up to set email alerts
|

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs

Abstract: Information flow control (IFC) checks whether a program can leak secret data to public ports, or whether critical computations can be influenced from outside. But many IFC analyses are imprecise, as they are flow-insensitive, context-insensitive, or object-insensitive; resulting in false alarms. We argue that IFC must better exploit modern program analysis technology, and present an approach based on program dependence graphs (PDG). PDGs have been developed over the last 20 years as a standard device to repres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
141
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 172 publications
(145 citation statements)
references
References 51 publications
1
141
0
Order By: Relevance
“…Later work by Horwitz et al [HRB90] casts the slicing problem as a graph traversal problem and extends the basic algorithm to the inter-procedural case, using a powerful grammar-based technique to analyse procedure calls in a context-sensitive manner. Hammer and Snelting [HS09,Ham10] explicitly apply this graph-based approach to the problem of information flow analysis. The algorithm presented by Horwitz et al is polynomial but the accompanying algorithmic analysis is stated for measures which are specific to their grammar constructions, preventing any straightforward comparison with the algorithm sketched for procedures in the current paper.…”
Section: Related Workmentioning
confidence: 99%
“…Later work by Horwitz et al [HRB90] casts the slicing problem as a graph traversal problem and extends the basic algorithm to the inter-procedural case, using a powerful grammar-based technique to analyse procedure calls in a context-sensitive manner. Hammer and Snelting [HS09,Ham10] explicitly apply this graph-based approach to the problem of information flow analysis. The algorithm presented by Horwitz et al is polynomial but the accompanying algorithmic analysis is stated for measures which are specific to their grammar constructions, preventing any straightforward comparison with the algorithm sketched for procedures in the current paper.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of data flow tracking, our approach restricts the standard notion of information flow analysis which also caters to implicit flows and aims at noninterference assessments [37,38,21,22]: our system detects only flows from container to container. This explains why we prefer to speak of data flow rather than information flow.…”
Section: Related Workmentioning
confidence: 99%
“…opened, (lines 12-15) at most 4 further times and within 30 seconds (1 timestep = 1 second) after the first use (lines [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27]; further attempts of opening the file will result in opening a predefined error message (lines 28-34).…”
Section: B1 Operating Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Hammer and Snelting describe how static analysis can be used to check whether the confidentiality or the integrity of the data processed by a program can be threatened by a user [13]. For their information-flow control, they use a program dependence graph, a representation already known in the area of static program analysis [15,3,11].…”
Section: Related Workmentioning
confidence: 99%