On Information Flow Forensics in Business Application Scenarios

To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business software applications and their deployment may be labeled secure, whereas in fact they are not. We present ongoing research towards information flow forensics, a novel approach for the a-posteriori detection of information flow. We motivate our work by illustrating the implications of illicit information flow in different software application scenarios and demonstrate why current approaches fall short of effectively enforcing information flow policies in many cases. We show that information flow forensics can mitigate these drawbacks and outline some interesting research challenges involved in its realization.

[1]  Ke Wang,et al.  An access control language for web services , 2002, SACMAT '02.

[2]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[3]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[4]  François Pottier,et al.  Information flow inference for ML , 2003, TOPL.

[5]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[6]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[7]  E. Stewart Lee,et al.  A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[8]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[9]  Reiner Hähnle,et al.  A Theorem Proving Approach to Analysis of Secure Information Flow , 2005, SPC.

[10]  Rafael Accorsi,et al.  Detective Information Flow Analysis for Business Processes , 2009, BPSC.

[11]  François Pottier A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[12]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[13]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[14]  Fabio Massacci,et al.  An access control framework for business processes for web services , 2003, XMLSEC '03.

[15]  Gary Enos Agencies reap benefits of planning ahead HIPAA. Health Insurance Portability and Accountability Act. , 2002, Behavioral healthcare tomorrow.

[16]  Torben Amtoft,et al.  Verification condition generation for conditional information flow , 2007, FMSE '07.

[17]  Heiko Mantel,et al.  Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[18]  Yoshinori Sato,et al.  Compliance-Monitor zur Frühwarnung vor Risiken , 2008, Wirtsch..

[19]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[20]  Isao Echizen,et al.  Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[21]  Dan Boneh,et al.  Exposing private information by timing web applications , 2007, WWW '07.

[22]  Geoffrey Smith,et al.  A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..

[23]  Claudia Eckert On security models , 1996, SEC.

[24]  David Brumley,et al.  Remote timing attacks are practical , 2003, Comput. Networks.

[25]  Scott F. Smith,et al.  Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[26]  Steve Zdancewic,et al.  Challenges for Information-flow Security , 2004 .

[27]  Gregor Snelting,et al.  Information Flow Control for Java Based on Path Conditions in Dependence Graphs , 2006, ISSSE.

[28]  Andrew C. Myers,et al.  Jif: java information flow , 1999 .

[29]  Rafael Accorsi,et al.  Compliance Monitor for Early Warning Risk Determination , 2008 .

[30]  Michael R. Clarkson,et al.  Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[31]  Fred B. Schneider,et al.  Enforceable security policies , 2000, TSEC.