ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification

03/22/2022
by   Sankha Narayan Guria, et al.
0

Non-interference is a popular way to enforce confidentiality of sensitive data. However, declassification of sensitive information is often needed in realistic applications but breaks non-interference. We present ANOSY, an approximate knowledge synthesizer for quantitative declassification policies. ANOSY uses refinement types to automatically construct machine checked over- and under-approximations of attacker knowledge for boolean queries on multi-integer secrets. It also provides an AnosyT monad to track the attacker knowledge over multiple declassification queries and checks for violations against user-specified policies in information flow control applications. We implement a prototype of ANOSY and show that it is precise and permissive: up to 14 declassification queries are permitted before a policy violation occurs using the powerset of intervals domain.

READ FULL TEXT
research
02/18/2020

ConSORT: Context- and Flow-Sensitive Ownership Refinement Types for Imperative Programs

We present ConSORT, a type system for safety verification in the presenc...
research
06/03/2019

Reasoning about disclosure in data integration in the presence of source constraints

Data integration systems allow users to access data sitting in multiple ...
research
02/25/2018

Secure Serverless Computing Using Dynamic Information Flow Control

The rise of serverless computing provides an opportunity to rethink clou...
research
11/20/2018

ESTRELA: Automated Policy Enforcement Across Remote APIs

Web applications routinely access sensitive and confidential data of use...
research
02/16/2020

Privaros: A Framework for Privacy-Compliant Delivery Drones

We present Privaros, a framework to enforce privacy policies on drones. ...
research
09/06/2021

QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

The enormous amount of code required to design modern hardware implement...
research
06/09/2021

Fundamental Privacy Limits in Bipartite Networks under Active Attacks

This work considers active deanonymization of bipartite networks. The sc...

Please sign up or login with your details

Forgot password? Click here to reset