Permissive Dynamic Information Flow Analysis Technical Report #UCSC-SOE-09-34

نویسندگان

  • Thomas H. Austin
  • Cormac Flanagan
چکیده

A key challenge in dynamic information flow analysis is handling implicit flows, where code conditional on a private variable updates a public variable x. The naive approach of upgrading x to private results in x being partially-leaked, where its value contains private data but its label may be either private (on this execution) or public (on an alternative execution where the conditional update was not performed). Prior work proposed the no-sensitive-upgrade check, which handles implicit flows by prohibiting partially-leaked data, but attempts to update a public variable from a private context causes execution to get stuck. To overcome this limitation, we develop a sound yet flexible permissiveupgrade strategy. To prevent information leaks, partially-leaked data is permitted but carefully tracked, and it must be upgraded to private before being used in a conditional test. We present an automatic dynamic analysis technique for inferring these upgrade annotations and inserting them into the program source code. The combination of these techniques allows more programs to run to completion, while still guaranteeing termination-insensitive non-interference in a purely-dynamic manner.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effect of VSIDS on SAT Solver Performance Technical Report UCSC-SOE-09-21

VSIDS, a popular decision heuristic introduced in CHAFF, is compared against several simple heuristics to evaluate its effectiveness on a given set of benchmarks.

متن کامل

Dynamic Information Flow Analysis for Featherweight JavaScript Technical Report #UCSC-SOE-11-19

Although JavaScript is an important part of Web 2.0, it has historically been a major source of security holes. Code from malicious advertisers and cross-site-scripting (XSS) attacks are particularly pervasive problems. In this paper, we explore dynamic information flow to prevent the loss of confidential information from malicious JavaScript code. In particular, we extend prior dynamic informa...

متن کامل

RedCard: Redundant Check Elimination For Dynamic Race Detectors Technical Report UCSC-SOE-13-05∗

Precise dynamic race detectors report an error if and only if an observed program trace exhibits a data race. They must typically check for races on all memory accesses to ensure that they catch all races and generate no spurious warnings. However, a race check for a particular memory access is guaranteed to be redundant if the accessing thread has already accessed that location within the same...

متن کامل

Program Transformation for Non-interference Verification on Programs with Pointers

Novel approaches for dynamic information flow monitoring are promising since they enable permissive (accepting a large subset of executions) yet sound (rejecting all unsecure executions) enforcement of non-interference. In this paper, we present a dynamic information flow monitor for a language supporting pointers. Our flow-sensitive monitor relies on prior static analysis in order to soundly e...

متن کامل

Case study: the resilience of the nature-based tourism system on Australia’s Great Barrier Reef

Disclaimer The views and opinions expressed in this publication are those of the author and do not necessarily reflect those of the Australian Government or the Minister for Sustainability, Environment, Water, Population and Communities. While reasonable efforts have been made to ensure that the contents of this publication are factually correct, the Commonwealth does not accept responsibility ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009