What You Lose is What You Leak: Information Leakage in Declassification Policies
Author(s) -
Anindya Banerjee,
Roberto Giacobazzi,
Isabella Mastroeni
Publication year - 2007
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2007.02.027
Subject(s) - counterexample , confidentiality , information leakage , computer science , partition (number theory) , model checking , computer security , domain (mathematical analysis) , information flow , information sensitivity , security policy , theoretical computer science , programming language , discrete mathematics , mathematics , mathematical analysis , linguistics , philosophy , combinatorics
This paper suggests the following approach for checking whether a program satisfies an information flow policy that may declassify secret information: (a) Compute a finite abstract domain that over-approximates the information released by the policy and (b) Check whether program execution may release more information than what is permitted by the policy by completing the finite abstract domain wrt. weakest liberal preconditions. Moreover, techniques based on the Paige-Tarjan algorithm for partition refinement can be used to generate counterexamples to a declassification policy: the counterexamples demonstrate that more information is released by the program than what the policy permits. Subsequently the policy can be refined so that the least amount of confidential information necessary for making the program secure is declassified
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom