期刊文献+

用数据流分析方法检查程序信息流安全 被引量:7

Data Flow Analysis for Checking Information Flow Security of Programs
下载PDF
导出
摘要 程序信息流安全是信息安全的一个重要研究方向.基于类型的分析虽然是检查程序信息流安全的一种有效方法,但过于保守.本文尝试将传统的数据流分析方法用于程序信息流安全的检查,即利用数据流分析来跟踪程序数据间的安全依赖关系,达到检查程序信息流安全的目的.和基于类型的方法相比,数据流分析方法能更加精确地分析程序,具有更大的宽容性.最后,本文对数据流分析方法的可靠性进行了证明. Ensuring information flow security of programs is an important research direction of information security.Typebased analysis can be used to check information flow security of programs, but they are overly conservative, This paper applies the standard technique of data flow analysis to check information flow security of programs in order to make the checking more accurately. It can statically determine how a program's outputs are related to its inputs, i.e. , how the former depends, directly or indirectly, on the latter. Compared with type-based analyses, the method proposed in this paper is more natural and less restrictive. Moreover, the soundness of the analysis is proved.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第1期102-106,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60473068)资助.
关键词 程序信息流安全 形式语义 静态分析 数据流分析 information flow security formal semantics static analysis data flow analysis
  • 相关文献

参考文献12

  • 1Sabelfeld A,Myers A C.Language-based information-flow security[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 2Goguen J A,Meseguer J.Security policies and security models[C].Proceedings of IEEE Symposium on Security and Privacy,1982:11-20.
  • 3Denning D E,Denning P J.Certification of programs for secure information flow[J].Communications of the ACM,1976,19(5):236-243.
  • 4Volpano D,Geoffrey S,Irvine Cynthia.A sound type system for secure flow analysis[J].Journal of Computer Security,1996,4(3):167-187.
  • 5Myers A C,Barbara Liskov.Complete,safe information flow with decentralized labels[C].Proceedings of IEEE Symposium on Security and Privacy,USA,May 1998:186-197.
  • 6Myers A C.Jflow:practical mostly-static information flow control[C].Proceedings of the 26th ACM Symposium on POPL,1999:228-241.
  • 7Zdancewic S.A type system for robust declassification[C].Proceedings of the 19th Conference on the Mathematical Foundations of Programming Semantics.Electronic Notes in Theoretical Computer Science,March 2003.
  • 8Pottier F,Simonet V.Information flow inference for ML[J].ACM Transactions on Programming Languages and Systems,2003,25(1):117-158.
  • 9Nielson F,Nielson H R,Hankin C.Principles of program analysis[M].Springer,1999.
  • 10Barbuti R,Bernardeschi C,Francesco N.De.abstract interpretation of operational semantics for secure information flow[J].Information Processing Letters,July 2002,83():101-108.

同被引文献36

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2沈建强,耿兆丰,邹轩.视频点播系统的设计与实现[J].计算机工程,2006,32(2):209-211. 被引量:28
  • 3张威,卢庆龄,万琳,肖庆.空指针引用故障模型与测试方法研究[J].计算机工程与应用,2006,42(4):71-72. 被引量:5
  • 4蒋烈辉,陈亮,吴金波,何红旗,费勤福,赵荣彩.基于控制流和数据段分析的反汇编策略研究[J].计算机工程,2007,33(2):94-96. 被引量:4
  • 5Kruegel C,Robertson W,Valeur F,et al.Static Disassembly of Obfuscated Binaries[C] //Proceedings of the 13th USENIX Security Symposium.San Diego,CA,USA:[s.n.] ,2004.
  • 6Denning D E, Denning P J. Certification of Programs for Secure Information Flow[J]. Communications of the ACM, 1976, 19(5): 236-243.
  • 7Andrews G R, Reitman R E An Axiomatic Approach to Information Flow in Programs[J]. ACM Transactions on Programming Languages and Systems, 1980, 2(1): 56-76.
  • 8Myers A C, Liskov B. Complete, Safe Information Flow with Decentralized Labels[C]//Proc. of IEEE Symposium on Security and Privacy. Oakland, USA: [s .n], 1998: 186-197.
  • 9Pottier F, Simonet V. Information Flow Inference for ML[J]. ACM Transactions on Programming Languages and Systems, 2003, 25(1): 117-158.
  • 10Cousot E Semantic Foundations of Program Analysis[M]. Englewood Cliffs, New Jersey, USA: Prentice-Hall, Inc., 1981.

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部