Compile-Time Detection of Information Flow in Sequential Programs

We give a formal definition of the notion of information flow for a simple guarded command language. We propose an axiomatisation of security properties based on this notion of information flow and we prove its soundness with respect to the operational semantics of the language. We then identify the sources of non determinism in proofs and we derive in successive steps an inference algorithm which is both sound and complete with respect to the inference system.

[1]  Dorothy E. Denning,et al.  Secure information flow in computer systems. , 1975 .

[2]  Barbara G. Ryder,et al.  Pointer-induced aliasing: a problem classification , 1991, POPL '91.

[3]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[4]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[5]  Chris Hankin,et al.  Deriving algorithms from type inference systems: application to strictness analysis , 1994, POPL '94.

[6]  Chris Hankin,et al.  Abstract Interpretation of Declarative Languages , 1987 .

[7]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[8]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[9]  Mark N. Wegman,et al.  Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.

[10]  Ellis S. Cohen Information transmission in computational systems , 1977, SOSP '77.

[11]  Ellis Choen,et al.  Information transmission in computational systems , 1977, SOSP 1977.

[12]  Gregory R. Andrews,et al.  An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.

[13]  John McLean,et al.  A Formal Method for the Abstract Specification of Software , 1984, JACM.

[14]  Richard J. Lipton,et al.  The enforcement of security policies for computation , 1975, J. Comput. Syst. Sci..

[15]  John McLean,et al.  Proving Noninterference and Functional Correctness Using Traces , 1992, J. Comput. Secur..

[16]  J. Banâtre,et al.  A Security Proof System for Networks of Communicating Processes , 1993 .