Hostname: page-component-77f85d65b8-hzqq2 Total loading time: 0 Render date: 2026-04-18T11:21:24.281Z Has data issue: false hasContentIssue false

Modelling declassification policies using abstract domain completeness

Published online by Cambridge University Press:  27 October 2011

ISABELLA MASTROENI
Affiliation:
Università di Verona, Verona, Italy Email: isabella.mastroeni@univr.it
ANINDYA BANERJEE
Affiliation:
IMDEA Software Institute, Madrid, Spain Email: anindya.banerjee@imdea.org

Abstract

This paper explores a three dimensional characterisation of a declassification-based non-interference policy and its consequences. Two of the dimensions consist of specifying:

  1. (a) the power of the attacker, that is, what public information a program has that an attacker can observe; and

  2. (b) what secret information a program has that needs to be protected.

Both these dimensions are regulated by the third dimension:
  1. (c) the choice of program semantics, for example, trace semantics or denotational semantics, or any semantics in Cousot's semantics hierarchy.

To check whether a program satisfies a non-interference policy, one can compute an abstract domain that over-approximates the information released by the policy and then check whether program execution can release more information than permitted by the policy. Counterexamples to a policy can be generated by using a variant of the Paige–Tarjan algorithm for partition refinement. Given the counterexamples, the policy can be refined so that the least amount of confidential information required for making the program secure is declassified.

Information

Type
Paper
Copyright
Copyright © Cambridge University Press 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable