Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Enforcing security and safety models with an information flow analysis tool
Chapman R., Hilton A.  Ada (Proceedings of the 2004 Annual ACM SIGAda International Conference on Ada: The Engineering of Correct and Reliable Software for Real-time & Distributed Systems Using Ada and Related Technologies, Atlanta, Georgia, USA, Nov 14-18, 2004)39-46.2004.Type:Proceedings
Date Reviewed: Feb 4 2005

Modern software development increasingly depends on integrating components developed by different teams, or even vendors. For security-critical applications, it is important to ensure that secrets (for example cryptographic keys) that should be contained in one component cannot be leaked to components that should have no access to the secret. In safety-critical applications, it has to be shown that the asserted safety of one component is not compromised when it is integrated with a component of a lower safety level. Chapman and Hilton present some ideas about how to analyze possible security violations, using an extension to the SPARK Examiner, a tool for information flow analysis in certain annotated Ada programs. They also show that the same techniques can be used to analyze whether integrating components at two differing safety levels compromises the safety of the whole application.

The paper starts with a short, motivating introduction. In the second section, the authors’ work is put into context, with a brief explanation of the different industry standards for secure and safe applications. The work seeks to achieve relatively high security and safety levels. The next parts of this section explain the difference between data flow analysis (direction of data flow) and information flow analysis (coupling between variables), hint very briefly at the basic ideas of two security models, present a very short overview of work on information flow analysis in Ada, and give examples of security- and safety-critical applications that were developed with the SPARK subset of Ada. The main body of the paper is section 3, where some of the technical ideas behind the extended SPARK examiner are explained, design decisions are discussed, and examples are given. This section also contains an overview of a case study conducted with a military information system, the lessons learned from this case study, and extensions of the work done so far. The last two sections contain issues for further research, and a short conclusion.

The major fault of this paper is its shortness; several ideas are only hinted at. There is barely enough information to see that the work is interesting and relevant. For a certain subset of the Ada community, this may be sufficient, but for users of other languages, or the general computer science public, too much information is missing. This could have been a very interesting paper, if the authors had managed to explain their ideas in a much more language-independent and general way, with more detail. As it is, the paper is of interest mostly to users of Ada, and even they will probably need correspondence with the authors to fill in the missing details, if they want to apply the ideas presented. There isn’t even information on how to obtain the extension to the SPARK examiner discussed in the paper.

Reviewer:  Markus Wolf Review #: CR130765 (0510-1126)
Bookmark and Share
 
Software/ Program Verification (D.2.4 )
 
 
Ada (D.2.6 ... )
 
 
Specifying And Verifying And Reasoning About Programs (F.3.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Software/Program Verification": Date
Verification of sequential and concurrent programs
Krzysztof R., Olderog E., Springer-Verlag New York, Inc., New York, NY, 1991. Type: Book (9780387975320)
Jul 1 1992
On verification of programs with goto statements
Lifschitz V. (ed) Information Processing Letters 18(4): 221-225, 1984. Type: Article
Mar 1 1985
The validation, verification and testing of software
Ince D. (ed), Oxford University Press, Inc., New York, NY, 1985. Type: Book (9789780198590040)
Sep 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy