Detecting violations of access control and information flow policies in data flow diagrams
نویسندگان
چکیده
The security of software-intensive systems is frequently attacked. High fines or loss in reputation are potential consequences not maintaining confidentiality, which an important objective. Detecting confidentiality issues early software designs enables cost-efficient fixes. A Data Flow Diagram (DFD) a modeling notation, focuses on essential, functional aspects such designs. Existing analyses DFDs support either information flow control access control, the most common mechanisms. Combining both mechanisms can be beneficial but existing DFD do this. This lack expressiveness requires designers to switch languages consider mechanisms, lead inconsistencies. In this article, we present extended syntax that supports both, and same language. improves compared related work avoids We define semantics by clauses first-order logic. logic program made these automated detection violations querying it. evaluate case study. attempt model nine cases six cases. successfully modeled fourteen out fifteen cases, indicates good expressiveness. reusability models when switching comparing share system design, three pairs show improved state art. evaluated accuracy executing them for could model. experienced accuracy.
منابع مشابه
A Dependent Type Theory for Verification of Information Flow and Access Control Policies
We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. We show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-o...
متن کاملModular Enforcement of Information Flow Policies in Data Structures
Standard implementations of common data structures such as hash tables can leak information, e.g. the operation history, to attackers with later access to a machine’s memory. This leakage is particularly damaging whenever the history of operations performed on a data structure must remain secret, such as in voting machines. We show how unique representation—the requirement that a data structure...
متن کاملAccess Control and Information Flow in Transactional Memory
The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to...
متن کاملTyping access control and secure information flow in sessions
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents information leaks due to the specific cont...
متن کاملMediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Systems and Software
سال: 2022
ISSN: ['0164-1212', '1873-1228']
DOI: https://doi.org/10.1016/j.jss.2021.111138