Eliminating Implicit Information Leaks by Transformational Typing and Unification


Date

2005

Publication Type

Report

ETH Bibliography

yes

Citations

Altmetric

Data

Abstract

Before starting the security analysis of an existing system, the most likely outcome is often already clear, namely that the system is not entirely secure. Modifying a program such that it passes the analysis is a difficult problem and usually left entirely to the programmer. In this article, we show that and how unification can be used to compute such program transformations. This opens a new perspective on the problem of correcting insecure programs. We demonstrate that integrating our approach into an existing transforming type system can also improve the precision of the analysis and the quality of the resulting programs.

Publication status

published

External links

Editor

Book title

Volume

498

Pages / Article No.

Publisher

ETH Zurich, Department of Computer Science

Event

Edition / version

Methods

Software

Geographic location

Date collected

Date created

Subject

Organisational unit

02150 - Dep. Informatik / Dep. of Computer Science

Notes

Funding

Related publications and datasets