Implicit Flows: Can't live with 'em, can't live without 'em. Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger. In R. Sekar and Arun K. Pujari, editors, Proceedings of the International Conference on Information Systems Security (ICISS), volume 5352 of Lecture Notes in Computer Science, pages 56-70. Springer, December 2008.

Verifying that programs trusted to enforce security actually do so is a practical concern for programmers and administrators. However, there is a disconnect between the kinds of tools that have been successfully applied to real software systems (such as taint mode in Perl and Ruby), and information-flow compilers that enforce a variant of the stronger security property of noninterference. Tools that have been successfully used to find security violations have focused on explicit flows of information, where high-security information is directly leaked to output. Analysis tools that enforce noninterference also prevent implicit flows of information, where high-security information can be inferred from a program's flow of control. However, these tools have seen little use in practice, despite the stronger guarantees that they provide.

To better understand why, this paper experimentally investigates the explicit and implicit flows identified by the standard algorithm for establishing noninterference. When applied to implementations of authentication and cryptographic functions, the standard algorithm discovers many real implicit flows of information, but also reports an extremely high number of false alarms, most of which are due to conservative handling of unchecked exceptions (e.g., null pointer exceptions). After a careful analysis of all sources of true and false alarms, due to both implicit and explicit flows, the paper concludes with some ideas to improve the false alarm rate, toward making stronger security analysis more practical.

[ .pdf ]

@INPROCEEDINGS{king08implicit,
  TITLE = {Implicit Flows: Can't live with 'em, can't live without 'em},
  AUTHOR = {Dave King and Boniface Hicks and Michael Hicks and Trent Jaeger},
  BOOKTITLE = {Proceedings of the International Conference on Information Systems Security (ICISS)},
  MONTH = DEC,
  YEAR = 2008,
  SERIES = {Lecture Notes in Computer Science},
  VOLUME = {5352},
  EDITOR = {R. Sekar and Arun K. Pujari},
  PUBLISHER = {Springer},
  PAGES = {56--70}
}

This file has been generated by bibtex2html 1.69