Quantitative Security Analysis for Multi-threaded Programs

نویسندگان

  • Tri Minh Ngo
  • Marieke Huisman
چکیده

Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel with only input and output, and the measure of leakage is based on the notions of initial uncertainty and remaining uncertainty after observing the final outcomes, are not suitable to multi-threaded programs. Besides, the information-theoretic approaches have been also shown to conflict with each other when comparing programs. Reasoning about the exposed information flow of multi-threaded programs is more complicated, since the outcomes of such programs depend on the scheduler policy, and the leakages in intermediate states also contribute to the overall leakage of the program. This paper proposes a novel model of quantitative analysis for multi-threaded programs that also takes into account the effect of observables in intermediate states along the trace. We define a notion of the leakage of a program trace. Given the fact that the execution of a multi-threaded program is typically described by a set of traces, the leakage of a program under a specific scheduler is computed as the expected value of the leakages of all possible traces. Examples are given to compare our approach with the existing approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Complexity and information flow analysis for multi-threaded programs

This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitative and quantitative security analysis, to check whether a multi-threaded program is secure or not. In this paper, besides reviewing classical analysis models, we present a novel model of quantitative analysis where the attacker is able to select the scheduling policy. This model does not follow th...

متن کامل

Compositional and Scheduler-Independent information flow security

Software pervades our society deeper with every year. This trend makes software security more and more important. For instance, software systems running critical infrastructures like power plants must withstand criminal or even terrorist attacks, but also smartphone apps used by consumers in their daily routine are usually expected to operate securely. In particular, before entrusting a program...

متن کامل

Detecting Reliability and Security Rule Violations

Real-world programs are undergoing paradigm shifts, and these shifts introduce reliability and security problems. One paradigm shift is that programs are moving from single-threaded to multi-threaded. However, multi-threaded programs are notoriously hard to get right, and a key reason is that these programs have too many possible thread interleavings, which aggravates understanding, testing, de...

متن کامل

Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs

In today’s information-based society, guaranteeing information security plays animportant role in all aspects of life: governments, military, companies, financialinformation systems, web-based services etc. With the existence of Internet,Google, and shared-information networks, it is easier than ever to access infor-mation. However, it is also harder than ever to protect the sec...

متن کامل

nement Properties for Multi Threaded Programs

Given a program that has access to some private information how can we ensure that it does not improperly leak the information We formalize the desired security property as a property called noninterference We discuss versions of noninterference appropriate for multi threaded programs with probabilistic scheduling and describe rules for ensuring noninterference

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013