Data Flow Analysis of Embedded Program Expressions

نویسندگان

  • Christopher Doble
  • Colin J. Fidge
  • Diane Corney
چکیده

Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security-critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these falsepositive data flow paths wastes an information security evaluator’s time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steering Clear of Triples: Deriving the Control Flow Graph Directly from the Abstract Syntax Tree in C Programs

This article explores the extension of Morgenthaler's Virtual Control Flow techniqueeMor97], which derives control owwASU86] semantics directly from the Abstract Syntax Tree, from the relatively coarse granularity of syntactic C expressions to the ner granularity of basic block expressions, that is, expressions without embedded control ow. We explain why this is a better level of abstraction fo...

متن کامل

A Formal Framework for Precise Parametric WCET Formulas

Parametric worst-case execution time (WCET) formulas are a valuable tool to estimate the impact of input data properties on the WCET at design time, or to guide scheduling decisions at runtime. Previous approaches to parametric WCET analysis either provide only informal adhoc solutions or tend to be rather pessimistic, as they do not take flow constraints other than simple loop bounds into acco...

متن کامل

Specialization of Imperative Programs Through Analysis of Relational Expressions

An inter-procedural data flow analysis operating on control flow graphs and collecting information about program expressions is described in this paper. The following relational and other expressions are analyzed: equivalences between program expressions and constants; linear-ordering inequalities between program expressions and constants; equalities originating from some program assignments; a...

متن کامل

Investigating Embedded Question Reuse in Question Answering

The investigation presented in this paper is a novel method in question answering (QA) that enables a QA system to gain performance through reuse of information in the answer to one question to answer another related question. Our analysis shows that a pair of question in a general open domain QA can have embedding relation through their mentions of noun phrase expressions. We present methods f...

متن کامل

Chemical reaction and radiation effects on MHD free convection flow through a porous medium bounded by a vertical surface with constant heat and mass flux

In the present paper, an analysis was carried out to investigate effects of radiation on a free convection flow bounded by a vertical surface embedded in a porous medium with constant suction velocity. It was under the influence of uniform magnetic field in the presence of a homogenous chemical reaction and viscous dissipation with constant heat and mass flux. The non-dimensional governing equa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012