This paper explores a three dimensional characterisation of a declassification-basednon-interference policy and its consequences. Two of the dimensions consist of specifying:(a) the power of the attacker, that is, what public information a program has that anattacker can observe; and(b) what secret information a program has that needs to be protected.Both these dimensions are regulated by the third dimension:(c) the choice of program semantics, for example, trace semantics or denotationalsemantics, or any semantics in Cousot’s semantics hierarchy.To check whether a program satisfies a non-interference policy, one can compute an abstractdomain that over-approximates the information released by the policy and then checkwhether program execution can release more information than permitted by the policy.Counterexamples to a policy can be generated by using a variant of the Paige–Tarjanalgorithm for partition refinement. Given the counterexamples, the policy can be refined sothat the least amount of confidential information required for making the program secure isdeclassified.

Modeling Declassification Policies using Abstract Domain Completeness

MASTROENI, Isabella;
2011-01-01

Abstract

This paper explores a three dimensional characterisation of a declassification-basednon-interference policy and its consequences. Two of the dimensions consist of specifying:(a) the power of the attacker, that is, what public information a program has that anattacker can observe; and(b) what secret information a program has that needs to be protected.Both these dimensions are regulated by the third dimension:(c) the choice of program semantics, for example, trace semantics or denotationalsemantics, or any semantics in Cousot’s semantics hierarchy.To check whether a program satisfies a non-interference policy, one can compute an abstractdomain that over-approximates the information released by the policy and then checkwhether program execution can release more information than permitted by the policy.Counterexamples to a policy can be generated by using a variant of the Paige–Tarjanalgorithm for partition refinement. Given the counterexamples, the policy can be refined sothat the least amount of confidential information required for making the program secure isdeclassified.
2011
Non-interference; Abstract completeness; Declassification
File in questo prodotto:
File Dimensione Formato  
J8-mscs11.pdf

accesso aperto

Tipologia: Documento in Post-print
Licenza: Dominio pubblico
Dimensione 578.36 kB
Formato Adobe PDF
578.36 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11562/343214
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 6
social impact