Abstract
We study unwinding conditions for the definition of non-interference properties of a simple imperative language, admitting parallel executions on a shared memory. We present different classes of programs obtained by instantiating a general unwinding framework and show that all the programs in these classes satisfy the non-interference principle. Moreover, we introduce a subclass of secure programs which is compositional with respect to the language constructors and we discuss verification techniques.
This work has been partially supported by the EU Contract IST-2001-32617 and the FIRB project RBAU018RCZ.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agat, J.: Transforming out Timing Leaks. In: Proc. of ACM Symposium on Principles of Programming Languages (POPL2000), pp. 40–53. ACM Press, New York (2000)
Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol. 3148, pp. 100–115. Springer, Heidelberg (2004)
Barthe, G., D’Argenio, P., Rezk, T.: Secure Information Flow by Self Composition. In: Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW2004), pp. 100–114. IEEE Computer Society Press, Los Alamitos (2004)
Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Verifying Persistent Security Properties. Computer Languages, Systems and Structures 30(3-4), 231–258 (2004)
Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate Non-Interference. In: Proc. of the IEEE Computer Security Foundations Workshop (CSFW2002), pp. 3–17. IEEE Computer Society Press, Los Alamitos (2002)
Focardi, R., Gorrieri, R.: Classification of Security Properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331–396. Springer, Heidelberg (2001)
Giacobazzi, R., Mastroeni, I.: Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation. In: Proc. of ACM Symposium on Principles of Programming Languages (POPL2004), pp. 186–197. ACM Press, New York (2004)
Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: Proc. of the IEEE Symposium on Security and Privacy (SSP1982), pp. 11–20. IEEE Computer Society Press, Los Alamitos (1982)
Goguen, J.A., Meseguer, J.: Unwinding and Inference Control. In: Proc. of the IEEE Symposium on Security and Privacy (SSP1984), pp. 75–86. IEEE Computer Society Press, Los Alamitos (1984)
Joshi, R., Leino, K.R.M.: A Semantic Approach to Secure Information Flow. Science of Computer Programming 37(1–3), 113–138 (2000)
Mantel, H.: Unwinding Possibilistic Security Properties. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 238–254. Springer, Heidelberg (2000)
Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)
Ryan, P.Y.A.: A CSP Formulation of Non-Interference and Unwinding. Cipher, 19–27 (1991)
Ryan, P.Y.A., Schneider, S.: Process Algebra and Non-Interference. Journal of Computer Security 9(1/2), 75–103 (2001)
Sabelfeld, A., Mantel, H.: Static Confidentiality Enforcement for Distributed Programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 376–394. Springer, Heidelberg (2002)
Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communication 21(1), 5–19 (2003)
Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation 14(1), 59–91 (2001)
Smith, G., Volpano, D.M.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL1998), pp. 355–364. ACM Press, New York (1998)
Volpano, D.M., Smith, G.: A Type-Based Approach to Program Security. In: TAPSOFT, pp. 607–621 (1997)
Winskel, G.: The formal semantics of programming languages. MIT Press, Cambridge (1993)
Zdancewic, S., Myers, A.C.: Robust Declassification. In: Proc. of the IEEE Computer Security Foundations Workshop (CSFW2001), pp. 15–23. IEEE Computer Society Press, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bossi, A., Piazza, C., Rossi, S. (2005). Unwinding Conditions for Security in Imperative Languages. In: Etalle, S. (eds) Logic Based Program Synthesis and Transformation. LOPSTR 2004. Lecture Notes in Computer Science, vol 3573. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506676_6
Download citation
DOI: https://doi.org/10.1007/11506676_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26655-6
Online ISBN: 978-3-540-31683-1
eBook Packages: Computer ScienceComputer Science (R0)