Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain

This paper presents an information flow analysis of Hibernate Query Language HQL. We define a concrete semantics of HQL and we lift the semantics on an abstract domain of propositional formulae. This way, we capture variables dependences at each program point. This allows us to identify illegitimate information flow by checking the satisfiability of propositional formulae with respect to a truth value assignment based on their security levels.

[1]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[2]  Agostino Cortesi,et al.  Information leakage analysis of database query languages , 2014, SAC.

[3]  Agostino Cortesi,et al.  Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications , 2015, VMCAI.

[4]  Andrew C. Myers,et al.  JFlow: practical mostly-static information flow control , 1999, POPL '99.

[5]  Agostino Cortesi,et al.  Information-Flow Analysis of Hibernate Query Language , 2014, FDSE.

[6]  Francesco Logozzo Class invariants as abstract interpretation of trace semantics , 2009, Comput. Lang. Syst. Struct..

[7]  Xiangyu Zhang,et al.  Strict control dependence and its effect on dynamic information flow analyses , 2010, ISSTA '10.

[8]  Jens Krinke,et al.  Information Flow Control and Taint Analysis with Dependence Graphs , 2007 .

[9]  Bernd Finkbeiner,et al.  Model Checking Information Flow in Reactive Systems , 2012, VMCAI.

[10]  Torben Amtoft,et al.  A logic for information flow analysis with an application to forward slicing of simple imperative programs , 2007, Sci. Comput. Program..

[11]  Geoffrey Smith,et al.  Principles of Secure Information Flow Analysis , 2007, Malware Detection.

[12]  Gregor Snelting,et al.  Information Flow Control for Java Based on Path Conditions in Dependence Graphs , 2006, ISSSE.

[13]  Salvador Cavadini,et al.  Secure slices of insecure programs , 2008, ASIACCS '08.

[14]  Agostino Cortesi,et al.  SAILS: static analysis of information leakage with sample , 2012, SAC '12.

[15]  Gregor Snelting,et al.  Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs , 2009, International Journal of Information Security.

[16]  Geoffrey Smith,et al.  A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..

[17]  Agostino Cortesi,et al.  Abstract interpretation of database query languages , 2012, Comput. Lang. Syst. Struct..

[18]  Patrick Cousot,et al.  Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.

[19]  Scott F. Smith,et al.  Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[20]  Christian Hammer Experiences with PDG-Based IFC , 2010, ESSoS.

[21]  Gregory R. Andrews,et al.  An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.

[22]  Christian Bauer,et al.  Java Persistence with Hibernate , 2006 .

[23]  Raju Haider Language-based security analysis of database applications , 2015 .

[24]  Bixin Li,et al.  Analyzing information-flow in java program based on slicing technique , 2002, SOEN.

[25]  François Pottier,et al.  Information flow inference for ML , 2003, TOPL.

[26]  K. Rustan M. Leino,et al.  A semantic approach to secure information flow , 2000, Sci. Comput. Program..

[28]  Heiko Mantel,et al.  Types vs. PDGs in Information Flow Analysis , 2012, LOPSTR.

[29]  David Sands,et al.  Declassification: Dimensions and principles , 2009, J. Comput. Secur..

[30]  Christian Bauer,et al.  Hibernate in action , 2005 .

[31]  Letizia Tanca,et al.  Operational and abstract semantics of the query language G-Log , 2002, Theor. Comput. Sci..

[32]  Patrick Cousot,et al.  Systematic design of program analysis frameworks , 1979, POPL.

[33]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[34]  Agostino Cortesi,et al.  Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis , 2015, CISIM.

[35]  Agostino Cortesi,et al.  Information Leakage Analysis by Abstract Interpretation , 2011, SOFSEM.