Confidentiality enforcement using dynamic information flow analyses

Doctor of Philosophy === Department of Computing and Information Sciences === David A. Schmidt, Anindya Banerjee, Thomas Jensen === With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline sec...

Full description

Bibliographic Details
Main Author: Le Guernic, Gurvan
Language:en_US
Published: Kansas State University 2007
Subjects:
Online Access:http://hdl.handle.net/2097/472
id ndltd-KSU-oai-krex.k-state.edu-2097-472
record_format oai_dc
spelling ndltd-KSU-oai-krex.k-state.edu-2097-4722017-08-16T15:44:32Z Confidentiality enforcement using dynamic information flow analyses Le Guernic, Gurvan Computer science Security Confidentiality Information flow Dynamic analysis Monitoring Computer Science (0984) Doctor of Philosophy Department of Computing and Information Sciences David A. Schmidt, Anindya Banerjee, Thomas Jensen With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches. 2007-12-06T19:13:53Z 2007-12-06T19:13:53Z 2007-12-06T19:13:53Z 2007 December Dissertation http://hdl.handle.net/2097/472 en_US Kansas State University
collection NDLTD
language en_US
sources NDLTD
topic Computer science
Security
Confidentiality
Information flow
Dynamic analysis
Monitoring
Computer Science (0984)
spellingShingle Computer science
Security
Confidentiality
Information flow
Dynamic analysis
Monitoring
Computer Science (0984)
Le Guernic, Gurvan
Confidentiality enforcement using dynamic information flow analyses
description Doctor of Philosophy === Department of Computing and Information Sciences === David A. Schmidt, Anindya Banerjee, Thomas Jensen === With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches.
author Le Guernic, Gurvan
author_facet Le Guernic, Gurvan
author_sort Le Guernic, Gurvan
title Confidentiality enforcement using dynamic information flow analyses
title_short Confidentiality enforcement using dynamic information flow analyses
title_full Confidentiality enforcement using dynamic information flow analyses
title_fullStr Confidentiality enforcement using dynamic information flow analyses
title_full_unstemmed Confidentiality enforcement using dynamic information flow analyses
title_sort confidentiality enforcement using dynamic information flow analyses
publisher Kansas State University
publishDate 2007
url http://hdl.handle.net/2097/472
work_keys_str_mv AT leguernicgurvan confidentialityenforcementusingdynamicinformationflowanalyses
_version_ 1718516567150428160