Abstract
We give a formal definition of the notion of information flow for a simple guarded command language. We propose an axiomatisation of security properties based on this notion of information flow and we prove its soundness with respect to the operational semantics of the language. We then identify the sources of non determinism in proofs and we derive in successive steps an inference algorithm which is both sound and complete with respect to the inference system.
Chapter PDF
Similar content being viewed by others
References
Abramsky (S.) and Hankin (C. L.), “Abstract interpretation of declarative languages”, Ellis Horwood, 1987.
Aho (A. V.), Sethi (R.) and Ullman (J. D.), “Compilers: Principles, Techniques and Tools”, Addison Wesley, Reading, Mass, 1986.
Andrews (G.R.), Reitman (R.P.), “An Axiomatic Approach to Information Flow in Programs”, in ACM Transactions on Programming Languages and Systems, volume 2 (1), January 1980, pages 504–513.
Banâtre (J.-P.) and C. Bryce, (C.), “A security proof system for networks of communicating processes”, Irisa research report, no 744, June 1993.
Banâtre (J.-P.) and C. Bryce, (C.), and Le Métayer (D.), “Mechanical proof of security properties”, Irisa research report, no 825, May 1994.
Cohen (E.), “Information Transmission in Computational Systems”, in Proceedings ACM Symposium on Operating System Principles, 1977, pages 133–139.
Cytron (R.), Ferrante (J.), Rosen (B. K.) and Wegman (M. N.), “Efficiently computing Static Single Assignment form and the control dependence graph”, in A CM Transactions on Programming Languages and Systems, Vol. 13, No 4, October 1991, pages 451–490.
Denning (D.E.), Secure Information Flow in Computer Systems, Phd Thesis, Purdue University, May 1975.
Denning (D.E.), Denning (P.J.), “Certification of Programs for Secure Information Flow”, in Communications of the ACM, volume 20 (7), July 1977, pages 504–513.
Hankin (C. L.) and Le Métayer (D.), “Deriving Algorithms from Type Inference Systems: Application to Strictness Analysis”, in Proceedings ACM POPL, 1994, pages 202–212.
Hoare (C.A.R.), Communicating Sequential Processes, Prentice-Hall London, 1985.
Jones (A.), Lipton (R.), “The Enforcement of Security Policies for Computations”, in Proceedings of the 5th Symposium on Operating System Principles, November 1975, pages 197–206.
Kennedy K. W., “A Survey of Data Flow Analysis Techniques”, in Program Flow Analysis, S. S. Muchnik and N. D. Jones, Eds, Prentice-Hall, Englewood Cliffs, NJ, 1981.
Lampson (B.), “A note on the Confinement Problem”, in Communications of the ACM, volume 16 (10), October 1973, pages 613–615.
Landi (W.) and Ryder (B. G.), “Pointer-induced aliasing: a problem classification”, in Proceedings ACM POPL, 1991, pages 93–103.
Landi (W.) and Ryder (B. G.), “A safe approximate algorithm for interprocedural pointer aliasing”, in Proceedings ACM Programming Language Design and Implementation, 1992, pages 235–248.
McLean (J.), “A Formal Method for the Abstract Specification of Software”, in Journal of the ACM, 31, July 1984, pages 600–627.
McLean (J.), “Proving Non-interference and Functional Correctness Using Traces”, in Journal of Computer Security, 1(1), Spring 1992, pages 37–57.
Mizuno (M.), Schmidt (D.), “A Security Control Flow Control Algorithm and Its Denotational Semantics Correctness Proof”, Journal on the Formal Aspects of Computing, 4 (6A), november 1992, pages 722–754.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banâtre, JP., Bryce, C., Le Métayer, D. (1994). Compile-time detection of information flow in sequential programs. In: Gollmann, D. (eds) Computer Security — ESORICS 94. ESORICS 1994. Lecture Notes in Computer Science, vol 875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58618-0_56
Download citation
DOI: https://doi.org/10.1007/3-540-58618-0_56
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58618-0
Online ISBN: 978-3-540-49034-0
eBook Packages: Springer Book Archive