Confidentiality enforcement using dynamic information flow analyses

dc.contributor.authorLe Guernic, Gurvan
dc.date.accessioned2007-12-06T19:13:53Z
dc.date.available2007-12-06T19:13:53Z
dc.date.graduationmonthDecember
dc.date.issued2007-12-06T19:13:53Z
dc.date.published2007
dc.description.abstractWith the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches.
dc.description.advisorDavid A. Schmidt
dc.description.advisorThomas JensenAnindya Banerjee
dc.description.degreeDoctor of Philosophy
dc.description.departmentDepartment of Computing and Information Sciences
dc.description.levelDoctoral
dc.description.sponsorshipNational Science Foundation
dc.identifier.urihttp://hdl.handle.net/2097/472
dc.language.isoen_US
dc.publisherKansas State University
dc.rights© the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectComputer science
dc.subjectSecurity
dc.subjectConfidentiality
dc.subjectInformation flow
dc.subjectDynamic analysis
dc.subjectMonitoring
dc.subject.umiComputer Science (0984)
dc.titleConfidentiality enforcement using dynamic information flow analyses
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
GurvanLeGuernic2007.pdf
Size:
1.41 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description: