Loading…
Automatic detection and demonstrator generation for information flow leaks in object-oriented programs
•Automatic detection of information flow (IF) leaks.•Support for IF policies: noninterference, declassification, information erasure.•Generation of demonstrator code for found leaks as JUnit tests.•Approach evaluation using micro benchmarks and a case study about E-Voting. We present a method to gen...
Saved in:
Published in: | Computers & security 2017-06, Vol.67, p.335-349 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | •Automatic detection of information flow (IF) leaks.•Support for IF policies: noninterference, declassification, information erasure.•Generation of demonstrator code for found leaks as JUnit tests.•Approach evaluation using micro benchmarks and a case study about E-Voting.
We present a method to generate automatically exploits for information flow leaks in object-oriented programs. The goal, similar to white-box test generation, is to automatically produce executable, reusable test cases that challenge a given information flow policy with a very high degree of guaranteed coverage. Our approach combines self-composition and symbolic execution to create an insecurity formula for a given program and information flow policy. Satisfiability of this formula signifies the presence of information leaks and permits to use model generation for creating exploits. We support different kinds of information flow policies like noninterference, delimited information release, and information erasure. A prototypic tool implementation for Java programs of our approach is available. It generates exploits in the form of self-contained, executable JUnit tests. We evaluate our method and tool based on a set of micro-benchmarks and a case-study on e-voting. |
---|---|
ISSN: | 0167-4048 1872-6208 |
DOI: | 10.1016/j.cose.2016.12.002 |