Quantified Interference for a While Language

Article English OPEN
Clark, David ; Hunt, Sebastian ; Malacaria, Pasquale (2005)
  • Publisher: Elsevier BV
  • Journal: Electronic Notes in Theoretical Computer Science, volume 112, pages 149-166 (issn: 1571-0661)
  • Related identifiers: doi: 10.1016/j.entcs.2004.01.018
  • Subject: Theoretical Computer Science | Computer Science(all) | QA75

We show how information theory can be used to give a quantitative definition of interference between variables in imperative programming languages. In this paper we focus on a particular case of this definition of interference: leakage of information from private variables to public ones in While language programs. The major result of the paper is a quantitative analysis for this language that employs a use-definition graph to calculate bounds on the leakage into each variable.
  • References (14)
    14 references, page 1 of 2

    [1] Clark, D., S. Hunt and P. Malacaria, Quantitative analysis of the leakage of confidential data , Electronic Notes in Theoretical Computer Science 59 (2002).

    [2] Clark, D., S. Hunt and P. Malacaria, Quantified interference for a while language, Technical report, King's College London (2003).

    [3] Cover, T. M. and J. A. Thomas, “Elements of Information Theory,” Wiley Interscience, 1991.

    [4] Denning, D. E. R., “Cryptography and Data Security,” Addison-Wesley, 1982.

    [5] Goguen, J. and J. Meseguer, Security policies and security models, in: IEEE Symposium on Security and Privacy (1982), pp. 11-20.

    [6] L.Burden, R. and J. D. Faires, “Numerical Analysis,” PWS-KENT, 1989, iSBN 0-534-93219-3.

    [7] McIver, A. and C. Morgan, A probabilistic approach to information hiding, in: Programming methodology, Springer-Verlag New York, Inc., 2003 pp. 441-460.

    [8] Millen, J., Covert channel capacity, in: Proc. 1987 IEEE Symposium on Research in Security and Privacy (1987).

    [9] Pierro, A. D., C. Hankin and H. Wiklicky, Approximate non-interference, in: I. Cervesato, editor, CSFW'02 - 15th IEEE Computer Security Foundation Workshop (2002).

    [10] Reynolds, J. C., Syntactic control of interference, in: Conf. Record 5th ACM Symp. on Principles of Programming Languages, ACM, New York, Tucson, Arizona, 1978, pp. 39-46.

  • Metrics
    No metrics available
Share - Bookmark