On Time-Sensitive Control Closure for Secure Information Flow
2025 (English)In: Lecture Notes in Computer Science, Springer Nature , 2025, p. 120-137Conference paper, Published paper (Refereed)
Abstract [en]
Information flow control aims at detecting the flow of sensitive information during the program execution in order to ensure the confidentiality and integrity of secret data. Static program dependency analysis calculates data and control dependencies that can be used to detect leakage of secret information. However, secret information can also be leaked through the timing channel inherent in the structure of the code, which cannot be identified using only the data and control dependencies. In this paper, we introduce the concept of Time-Sensitive Control Closure (TSCC), which offers a very general notion of control dependency. We demonstrate the application of TSCC to the fundamental semantic notion of secure information flow called noninterference. By combining TSCC with data dependencies, we develop program slicing techniques capable of detecting security leaks through both information and timing channels. To compute TSCC efficiently, we present a log-linear time algorithm to generate the influencer graph representation of programs, and a linear time algorithm to compute TSCC from the generated influencer graph. Our algorithm is implemented within the Clang/LLVM compiler infrastructure, and we conduct experiments using well-known benchmarks. The experimental evaluation validates the accuracy and performance improvements offered by the TSCC algorithm compared to existing control dependency approaches. These results demonstrate the practical utility of TSCC in enhancing the security of real-world applications.
Place, publisher, year, edition, pages
Springer Nature , 2025. p. 120-137
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 15593 LNCS
Keywords [en]
Benchmarking, Data flow graphs, Data integrity, Data transfer, Graph algorithms, Information management, Program compilers, Sensitive data, Dependency analysis, Information flow control, Linear-time algorithms, Program execution, Secret data, Secret information, Secure information flow, Sensitive informations, Static program, Timing channels, Information leakage
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:mdh:diva-70995DOI: 10.1007/978-3-031-87054-5_9ISI: 001525057300009Scopus ID: 2-s2.0-105001337782ISBN: 9783031870538 (print)OAI: oai:DiVA.org:mdh-70995DiVA, id: diva2:1950952
Conference
11th IFIP WG 2.2 International Conference on Fundamentals of Software Engineering, FSEN 2025, Västerås 7 April 2025 through 8 April 2025
2025-04-092025-04-092025-10-10Bibliographically approved