Data Flow Analysis of Embedded Program Expressions
نویسندگان
چکیده
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security-critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these falsepositive data flow paths wastes an information security evaluator’s time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
منابع مشابه
Steering Clear of Triples: Deriving the Control Flow Graph Directly from the Abstract Syntax Tree in C Programs
This article explores the extension of Morgenthaler's Virtual Control Flow techniqueeMor97], which derives control owwASU86] semantics directly from the Abstract Syntax Tree, from the relatively coarse granularity of syntactic C expressions to the ner granularity of basic block expressions, that is, expressions without embedded control ow. We explain why this is a better level of abstraction fo...
متن کاملA Formal Framework for Precise Parametric WCET Formulas
Parametric worst-case execution time (WCET) formulas are a valuable tool to estimate the impact of input data properties on the WCET at design time, or to guide scheduling decisions at runtime. Previous approaches to parametric WCET analysis either provide only informal adhoc solutions or tend to be rather pessimistic, as they do not take flow constraints other than simple loop bounds into acco...
متن کاملSpecialization of Imperative Programs Through Analysis of Relational Expressions
An inter-procedural data flow analysis operating on control flow graphs and collecting information about program expressions is described in this paper. The following relational and other expressions are analyzed: equivalences between program expressions and constants; linear-ordering inequalities between program expressions and constants; equalities originating from some program assignments; a...
متن کاملInvestigating Embedded Question Reuse in Question Answering
The investigation presented in this paper is a novel method in question answering (QA) that enables a QA system to gain performance through reuse of information in the answer to one question to answer another related question. Our analysis shows that a pair of question in a general open domain QA can have embedding relation through their mentions of noun phrase expressions. We present methods f...
متن کاملChemical reaction and radiation effects on MHD free convection flow through a porous medium bounded by a vertical surface with constant heat and mass flux
In the present paper, an analysis was carried out to investigate effects of radiation on a free convection flow bounded by a vertical surface embedded in a porous medium with constant suction velocity. It was under the influence of uniform magnetic field in the presence of a homogenous chemical reaction and viscous dissipation with constant heat and mass flux. The non-dimensional governing equa...
متن کامل