Skip to main content
Article thumbnail
Location of Repository

Secure information flow: analysis and enforcement

By Adedayo Oyelakin Adetoye


When a computer program requires legitimate access to confidential data, the question arises whether such a program may reveal sensitive information to an unauthorised observer. There is therefore a need to ensure that a program, which processes confidential data, is free of unwanted information flow. This thesis presents a formal framework for the analysis and enforcement of secure information flow in computational systems such as computer programs. An important aspect of the problem of secure information flow is the development of policies by which we can express intended information release. For this reason information lattices and maps on these lattices are presented as models, which capture intuitive notions about information and information flow. A definition of security is given, based on the lattice formalisation of information and information flow, that exploits the partial order of the information lattice. The lattice formalisation gives us a uniform way to enforce information security policies under various qualitative and quantitative representations of information. An input-output relational model, which describes how a system transforms its input to publicly observable outputs with respect to a given attacker model, is presented as a primitive for the study of secure information flow. By using the relational model, various representations of information, which are shown to fit into the lattice model of information, are derived for the analysis of information flow under deterministic and nondeterministic system models. A systematic technique to derive the relational model of a system, under a given attacker model, from the operational semantics in a language-based setting, is also presented. This allows the development of information flow analyses parametrised by chosen attacker models. A flow-sensitive and termination-sensitive static analysis calculus is presented for the analysis of information flow in programs written in a deterministic While language with outputs. The analysis is shown to be correct with respect to an attacker model that is able to observe all program outputs and which can determine the termination or nontermination of program execution. The static analysis also detects certain disjunctive information release. A termination-sensitive dependency analysis is developed which demonstrates how, by employing abstract interpretation techniques, other less precise but possibly more efficient information flow analysis may be obtained. The thesis concludes with further examples to highlight various aspects of the information flow analysis and enforcement framework developed

Topics: T Technology (General)
Year: 2009
OAI identifier:

Suggested articles


  1. (1999). A core calculus of dependency.
  2. (2004). A process-algebraic approach for the analysis of probabilistic noninterference.
  3. (2008). Cryptographically-masked flows. doi
  4. (2008). Estimating the maximum information leakage. doi
  5. (2007). Gradual release: Unifying declassification, encryption and key release policies.
  6. (2004). Information flow analysis in logical form.
  7. (2005). Quantifying probabilistic information flow in computational reactive systems.
  8. (2001). Structural operational semantics. doi
  9. (2008). Terminationinsensitive noninterference leaks more than just a bit.
  10. (2000). Transforming out timing leaks.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.