SlideShare a Scribd company logo
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
DOI : 10.5121/ijsptm.2016.5301 1
CONTROLLING INFORMATION FLOWS DURING
SOFTWARE DEVELOPMENT
Shih-Chien Chou
Department of Computer Science and Information Engineering, National Dong Hwa
University, Taiwan
ABSTRACT
Information flow control (IFC) is useful in preventing information leakage during software execution. Our
survey reveals that no IFC model is applied on the entire software development process. Applying an IFC
model on the entire software development process offers the following features: (1) viewpoints of all
stakeholders (i.e., customers and analysts) can be included and (2) the IFC model helps correcting
statements that may leak information during every development phase. In addition that no IFC model is
applied to the entire software development process, we failed to identify an IFC model that can reduce
runtime overhead. According to the above description, we designed a new IFC model named PrcIFC
(process IFC). PrcIFC is applied on the entire software development process. Moreover, PrcIFC is
disabled after software testing to reduce runtime overhead.
KEYWORDS
Software security, information flow control, software development process, reduce runtime overhead
1. INTRODUCTION
Information security covers many issues such as cryptography, authentication, and access control.
Information flow control (IFC) is a branch of access control. It prevents information leakage
during software execution. Information leakage occurs when persons or other software illegally
obtain sensitive information from a software system. In general, persons can obtain information
from files or output devices and software can obtain information from files. Information leakage
may thus happen when sensitive information is output.
In the early days, IFC is applied in a single system. In the recent years, IFC has been applied to
operating systems [1-3], web services [4-7], and even cloud applications [8-9]. In other words,
IFC has been applied to the entire Internet. IFC is thus essential in information security. We
involved in the research of IFC for years and identified that no IFC model is applied on the entire
software development process. Applying IFC on the entire software development process offers
the following features: (1) viewpoints of all stakeholders (i.e., customers and analysts) can be
included and (2) the IFC model helps correcting statements that may leak information during
every development phase. We also identified that no IFC model take runtime overhead reducing
into consideration, in which the overhead is induced by embedding IFC models in software. We
thus designed a new IFC model to overcome the problems mentioned above. The design is based
on the following considerations:
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
2
a. Embedding the IFC model into software specifications and design documents. Traditional
models are embedded in software only, which may exclude the viewpoints of some
stakeholders.
b. Executing the specifications and design documents in which the IFC model is embedded.
This execution causes the IFC correctness of specifications and design documents to be
checked.
c. Embedding the IFC model in the software during testing. The testing thus tests both the
correctness of functions and IFC. After testing, the model is disabled to remove runtime
overhead induced by IFC model.
As described in term c above, the IFC model proposed in this paper is disabled after testing.
Nevertheless, software that passes the testing is not ensured to be correct. Therefore, the operating
system should intercept software output information to ensure security (OS intercepts only output
information because only output information may be leaked to persons or other software). In our
research, we design the IFC model and let the OS interception as a future work. Since the model
is applied in the entire software development process, we name it PrcIFC (process IFC). The core
of PrcIFC is the same as NetIFC [10] we designed before. When designing PrcIFC, we ignored
the affect of viruses and Trojan horses because they belong to other research areas. During the
development of PrcIFC, we identified the following facts.
a. Since only output information may be leaked (to persons or other programs), only output
statements need to be controlled. As to other statements, the join operation [11] should be
used to adjust variable sensitivity after execution. This adjustment prevents possible
information leakage when the variable is output later.
b. Information should be separated in different group for compatibility. For example, prices with
the units of USD and EUR are incomparable.
According to the facts, PrcIFC controls output statements and uses join operations to adjust
information sensitivity for other statements. PrcIFC presented in this paper offers the following
major features:
a. PrcIFC is applied on the entire software development process. Therefore, it will not exclude
the viewpoints of any stakeholders and helps correcting statements that may leak information
during every phase of the development.
b. PrcIFC is removed when software is online, which remove runtime overhead.
2. RELATED WORK
Traditional lattice-based model [12-13] is a MAC (mandatory access control) which is criticized
as too restricted. The decentralized label model [11, 14] uses labels to mark the security levels of
variables. A label is composed of policies to be simultaneously obeyed. The model in [15] uses
ACLs of objects to compute ACLs of executions.
The model Trust-Serv [16] uses state machines to dynamically choose web services at run time. It
uses trust negotiation [17] to select web services that can be invoked. The kernel component to
determine whether a web service can be invoked is credential. The model proposed in [18] uses
digital credentials for negotiation. It defines strategies for negotiation policies. SCIFC [6] uses
various mechanism and algorithms to make sure whether a service chain can be successfully
invoked.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
3
Flume [1] is a decentralized information flow control (DIFC) model for operating systems. It
tracks information flows in a system using tags and labels. The control granularity is detailed to
processes. The secrecy tags prevent information leakage and integrity tags prevent information
corruption. Flume also avoids information leaked to untrusted channel. The function of Laminar
[2] is similar to that of Flume.
The model proposed in [19] uses X-GTRBAC [20] to control the access of web services. X-
GTRBAC can be used in heterogeneous and distributed sites. Moreover, it applies TRBAC [21]
to control the factor related to time. The model in [22] uses RBAC (role-based access control)
concept [23-24] to define policies of accessing a web service. It is a two-levelled mechanism. The
first level checks the roles assigned to requesters and web services. The second level uses
parameters as attributes and assigns permissions to the attributes. An authorized requester can
invoke a web service only when it possesses the permissions to access the attributes.
The model in [25] identifies dependencies among I/O parameters of services to decide whether
service invocations will leak information. The model in [26] offers functions to check intra-
component information flows through the JIF language [27]. The model in [8] applied the
Chinese Wall model [28] to control information flows in the IaaS level. As to services in the SaaS
level, the model cannot control their information flows. In the recent survey of [9], the authors
especially emphasize the importance of data privacy in a cloud computing environment. They
believed that information flow control is a good solution for the problem. However, the article did
not propose a concrete information flow control model.
According to our survey, no research applies IFC in the entire software development process and
almost no one discusses runtime overhead.
Figure 1. Design Philosophy Of Prcifc
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
4
3. PRCIFC
Figure 1 depicts the design philosophy of PrcIFC. Before describing Figure 1, we assume that
software development tools, such as the UML development platform, are trusted. Therefore,
PrcIFC needs not handle possible problems induced by software development tools.
Figure 1 shows that we embed PrcIFC in specifications then execute them. To execute a
specification, we use our rapid prototyping language [29] to write the specification. That is, we
embed PrcIFC in our prototyping language. If a specification passes the test of both functional
and IFC requirements, the specification can be designed. Otherwise, the requirement should be
re-analyzed. During the design, we use the target language (such as C) to write the design
documents and embed PrcIFC in the documents. The documents are then executed and tested. If
the design documents pass the test of both functional and IFC requirements, the design document
can be implemented. Otherwise, the design activity should be repeated. During implementation,
PrcIFC is embedded in the programs. The programs are then executed. If the programs pass the
test of both functional and IFC requirements, the programs are released to the customers as a
software system. Before the software system is online, PrcIFC is disabled to completely remove
the runtime overhead. When the software is online, the OS intercepts the output of the software to
check possible information leakage. However, the interception is out of the scope of this paper.
According to the description in section 1, information should be associated with a mechanism to
represent its sensitivity. The sensitivity should include a security level number and group.
Moreover, we need a join operation to adjust the sensitivity of variables in non-output statements.
In this regard, we let a variable’s sensitivity be “(Sln, Gv)”, in which Sln is the security level
number whereas Gv is the group. We call the sensitivity a security level. Therefore, every piece of
information that should be protected is associated with a security level. The definition of security
levels results in a lattice. According to the lattice, only output statements are controlled strictly
and other statements applies the join operation to adjust the security level of variables. Suppose a
piece of information derived from the variable set “{bi | bi is a variable associated with the
security level ),(S ii bb Gvlv }” is outputting to the port a (here a port is a device or a file), which is
associated with a security level ),(S aa Gvlv . Then, PrcIFC will check the security of the output
statement using the following rule
Rule 1. ))(()( ababi SlvSlvMAXGpGp ii
≤∧≠∩∩ φ (1)
The former part of the rule requires that the output port a and the variables bi in the variable set
should be compatible. Otherwise, the outputting is illegal. The latter part requires that the security
level number of the output port should be at least the same as the variables in the variable set.
This prevents leaking information carried by bi to an output port. As to non-output statement,
suppose a piece of information a, which is associated with a security level ),(S aa Gvlv , is derived
from the variable set “{bi | bi is a variable associated with the security level ),(S ii bb Gvlv }”. Then,
PrcIFC requires that the condition “ )( φ≠∩∩ abi GpGp i
” to be true, which means that the
information a and variables bi in the variable sets are compatible. If the condition is true, the
following rule is used to adjust the security of the information a.
Rule 2. Slva = )( ibSlvMAX (2)
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
5
4. PROVE OF CORRECTNESS
Information leakage may occur during output, including outputting to files and devices.
Case 1. Outputting information to a device will not leak information under the control of PrcIFC.
Proof. Information output to a device Dv may only leak to persons. Suppose person P possesses a
security level number SLVp and SLVp< SlvDv. If Dv and all information sources are in the same
group, Rule 1 allows the output only when )( ibSlvMAX ≤ SlvDv. If the output is allowed, P
cannot access information output to Dv because SLVp< SlvDv. Since bi derives the information
output to Dv, no bi will be leaked to P.
Case 2. Outputting information to file will not leak information under the control of PrcIFC.
Proof. Information output to a file Fi may be leaked to persons or software. If Fi and all sources
are in the same group, Rule 1 allows the output only when )( ibSlvMAX ≤SlvFi. Case 1
above states that no bi will be leaked to a person P with a security level number SLVp and
SLVp< SlvFi. On the other hand, if the software Sfi intends to read the information of V from
Fi to the variable V1, Rule 2 causes vSlv to be the same as 1vSlv . If Sfi outputs V1 to a
device, Case 1 states that V1 will not be leaked to a person. If V1 is output to another file, the
proof goes back to the beginning of this proof. However, we know that the information of a
sensitive variable may be: (a) operating by a software system, (b) output to a device, or (c)
output to a file. Information operating by a software system will not be leaked without
output. Information output to a device will not be leaked (see Case 1). As to the information
output to a file, it will not be leaked to persons. #
5. EXPERIMENT RESULTS
We required students to develop a simple library system using UML as the development model.
The target language is C. We organized two groups of students for the experiment, in which every
group was consisted of ten students. For the first group, we required students to develop the
system without PrcIFC. PrcIFC was embedded in their systems during implementation. That is,
the students needed not use the prototyping language to write specifications and needed not use
the target language to write design documents. On the other hand, we required students in the
other group to follow the process in Figure 1 to develop their software. During software
development, we required the students to collect the time they develop documents. During
testing, we required students to collect the number of statements that violate PrcIFC. The
collected data were then averaged. Table 1 depicts the averaged data, in which the development
time of the first group is normalized to one.
Table 1. Experiment result
Group Requirement analysis
time System design time Implementation
time
Statements violating
PrcIFC
1 1 1 1 5.33
2 1.25 1.32 0.69 1.98
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
6
Table 1 shows that the requirement analysis and design time of the second group was more than
that of the first group. This is reasonable because students in the group should write their
specifications and design documents using the prototyping language and the target language,
respectively. Moreover, PrcIFC should be embedded in the languages. On the other hand, the
implementation time of the second group was much less because the design documents had been
written in the target language. Moreover, students in the first group should embed PrcIFC in their
systems. What we especially concerned is the statements that violate PrcIFC. The experiment
result exercises us and we believe that PrcIFC is indeed valuable, because many statements that
may leak information have been removed during software development phases before
implementation.
6. CONCLUSION
Information flow control (IFC) is useful in preventing information leakage during software
execution. According to our survey, we cannot identify an IFC model that is applied on the entire
software development process. Applying IFC model on the entire software development process
will not exclude the viewpoints of any stakeholders. Moreover, statements that may leak
information can be identified during every phase of software development. The other problem of
traditional IFC models is large runtime overhead. We cannot identify a model that can remove
this overhead. According to the description above, we design a new IFC model named PrcIFC
(process IFC). It offers the following major features:
1. PrcIFC is applied on the entire software development process. Therefore, it will not exclude
the viewpoints of any stakeholders and helps correcting statements that may leak
information during every phase of the development.
2. PrcIFC is disabled when software is online, which remove runtime overhead.
In the future, we will require students to apply PrcIFC on their exercises for checking the
advantages and disadvantages of the model in depth. We hope to improve PrcIFC from the
responses of students.
REFERENCES
[1] M. Krohn, A. Yip, M. Brodsky, and N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, “Information
Flow Control for Standard OS Abstractions”, SOSP’07, 2007.
[2] I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel, “Laminar: Practical Fine-Grained
Decentralized Information Flow Control”, PLDI’09, 2009.
[3] N. Zeldovich, S. Boyd-Wickizer, and D. Mazières, “Securing Distributed Systems with Information Flow
Control”, NSDI '08, pp. 293–308, 2008
[4] S. –C. Chou and C. –H. Huang, “An Extended XACML Model to Ensure Secure Information Access for
Web Services”, Journal of Systems and Software, vol. 83, no. 1, pp. 77-84, 2010.
[5] S. –C. Chou, “Dynamically Preventing Information Leakage for Web Services using Lattice”, to appear in
5’th International Conference on Computer Sciences and Convergence Information Technology (ICCIT),
2010.
[6] W. She, I. –L. Yen, B. Thuraisingham, and E. Bertino, “The SCIFC Model for Information Flow Control in
Web Service Composition”, 2009 IEEE International Conference on Web Services, 2009.
[7] W. She, I. –L. Yen, B. Thuraisingham, and E. Bertino, “Effective and Efficient Implementation of an
Information Flow Control Protocol for Service Composition”, IEEE International Conference on Service-
Oriented Computing and Applications, 2009.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016
7
[8] R. Wu, G. –J., Ahn, H. Hu, and M. Singhal, “Information Flow Control in Cloud Computing”, Proceedings
of the 6th International Conference on Collaborative Computing: Networking, Applications and
Worksharing, 2010
[9] J. Bacon, D. Eyers, T. F. J. –M. Pasquier, J. Singh, and P. Piezuch, “Information Flow Control for Secure
Cloud Computing”, IEEE Trans. Network and Service Management, 11(1), pp. 76-89, 2014.
[10] S. -C. Chou, “Controlling Information Flows in Net Services with Low Runtime Overhead”, International
Journal of Computer Network and Information Security, vol. 7, no. 3, pp. 1-9, 2015.
[11] Myers A., and Liskov, B., 1998. Complete, Safe Information Flow with Decentralized Labels. Proc. 14’th
IEEE Symp. Security and Privacy, 186-197.
[12] D. E., Denning, 1976. “A Lattice Model of Secure Information Flow”, Comm. ACM, vol. 19, no. 5, 236-
243, 1976.
[13] D. E., Denning, P. J., and Denning, Certification of Program for Secure Information Flow”, Comm. ACM,
vol. 20, no. 7, 504-513, 1977.
[14] Myers A., and Liskov, B., 2000. Protecting Privacy using the Decentralized Label Model. ACM Trans.
Software Eng. Methodology, vol. 9, no. 4, 410-442.
[15] Samarati, P., Bertino, E., Ciampichetti, A., and Jajodia, S., 1997. Information Flow Control in Object-
Oriented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, 524-538.
[16] Samarati, P., Bertino, E., Ciampichetti, A., and Jajodia, S., 1997. Information Flow Control in Object-
Oriented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, 524-538.
[17] Yu, T., Winslett, M., Seamons, K., 2003. Supporting Structured Credentials and Sensitive Policies through
Interoperable Strategies for Automated Trust Negotiation. ACM Transactions on Information and System
Security, vol. 6, no. 1, 1-42.
[18] Koshutanski, H., Massacci, F., 2005. Interactive Credential Negotiation for Stateful Business Processes,
Lecture notes in computer science, 256-272.
[19] Bhatti, R., Bertino, E., Ghafoor, A., 2004. A Trust-based Context-aware Access Control Model for Web
Services. IEEE ICW’04, 184 – 191.
[20] Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J. B. D., 2005. X-GTRBAC: An XML-Based Policy
Specification Framework and Architecture for Enterprise-Wide Access Control. ACM Transactions on
Information and System Security (TISSEC), Vol. 8, No. 2, 187 – 227.
[21] Bertino, E., Bonatti P. A., Ferrari, E., 2001. TRBAC: A Temporal Role-Based Access Control Model.
ACM Transactions on Information and System Security, Vol. 4, No. 3, 191 – 233.
[22] Wonohoesodo R., Tari, Z., 2004. A Role Based Access Control for Web Services. Proceedings of the 2004
IEEE International Conference on Service Computing, 49-56.
[23] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E., 1996. Role-Based Access Control Models.
IEEE Computer, vol. 29, no. 2, 38-47.
[24] R. Sandhu, D. F., Ferraiolo, and D. R., Kuhn, D. "The NIST Model for Role Based Access Control:
Toward a Unified Standard", 5th ACM Workshop Role-Based Access Control. pp. 47–63, 2000
[25] W. She, I. -L. Yen, B. ThuraiSingham, and S. –Y. Huang, “Rule-Based Run-Time Information Flow
Control in Service Cloud”, 2011 IEEE International Conferences on Web Services, pp. 524-531, 2011.
[26] L. Sfaxi, T. Abdellatif, R. Robbana, and Y. Lakhnech, “ Information Flow Control of Component-Based
Distributed Systems”, Concurrency and Computation: Practice and Experience, available on
http://www.bbhedia.org/robbana/Wiley.pdf
[27] JIF website, “Jif: Java + information flow”, available on http://www.cs.cornell.edu/jif/
[28] Brewer, D.F.C., Nash, M.J., 1989. The Chinese Wall Security Policy. In: Proceedings of the 5’th IEEE
Symposium on Security and Privacy, 206-214.
[29] S. -C. Chou, “A Prototyping Technique to Verify Requirements”, ICS 2002, Hualien, Taiwan.
AUTHORS
Shih-Chien Chou is currently a professor in the Department of Computer Science and
Information Engineering, National Dong Hwa University, Hualien, Taiwan. His research
interests include software engineering, process environment, software reuse, and
information flow control.

More Related Content

What's hot

Case study-loan-processing-test-plan
Case study-loan-processing-test-planCase study-loan-processing-test-plan
Case study-loan-processing-test-plan
Aarush Sharma
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
IRJET Journal
 
Mca se chapter_07_software_validation
Mca se chapter_07_software_validationMca se chapter_07_software_validation
Mca se chapter_07_software_validation
Aman Adhikari
 
Industrial perspective on static analysis
Industrial perspective on static analysisIndustrial perspective on static analysis
Industrial perspective on static analysis
Chirag Thumar
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics TestingCloudCheckr
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
IJNSA Journal
 
MANCAFChat - An Application to Evaluate MANCAF Framework
MANCAFChat - An Application to Evaluate MANCAF FrameworkMANCAFChat - An Application to Evaluate MANCAF Framework
MANCAFChat - An Application to Evaluate MANCAF Framework
iosrjce
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
Emi Rizki Ayunanda
 
Testing desktop application police station information management system
Testing desktop application police station information management systemTesting desktop application police station information management system
Testing desktop application police station information management system
Salam Shah
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
ijseajournal
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A Review
CSCJournals
 
Defect Management Practices and Problems in Free/Open Source Software Projects
Defect Management Practices and Problems in Free/Open Source Software ProjectsDefect Management Practices and Problems in Free/Open Source Software Projects
Defect Management Practices and Problems in Free/Open Source Software Projects
Waqas Tariq
 
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
RAKESH RANA
 
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Waqas Tariq
 
2016 state of industrial internet application development
2016 state of industrial internet application development2016 state of industrial internet application development
2016 state of industrial internet application development
eraser Juan José Calderón
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 

What's hot (19)

Case study-loan-processing-test-plan
Case study-loan-processing-test-planCase study-loan-processing-test-plan
Case study-loan-processing-test-plan
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
Mca se chapter_07_software_validation
Mca se chapter_07_software_validationMca se chapter_07_software_validation
Mca se chapter_07_software_validation
 
Industrial perspective on static analysis
Industrial perspective on static analysisIndustrial perspective on static analysis
Industrial perspective on static analysis
 
1506.08725v1
1506.08725v11506.08725v1
1506.08725v1
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics Testing
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 
MANCAFChat - An Application to Evaluate MANCAF Framework
MANCAFChat - An Application to Evaluate MANCAF FrameworkMANCAFChat - An Application to Evaluate MANCAF Framework
MANCAFChat - An Application to Evaluate MANCAF Framework
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
 
Testing desktop application police station information management system
Testing desktop application police station information management systemTesting desktop application police station information management system
Testing desktop application police station information management system
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A Review
 
Defect Management Practices and Problems in Free/Open Source Software Projects
Defect Management Practices and Problems in Free/Open Source Software ProjectsDefect Management Practices and Problems in Free/Open Source Software Projects
Defect Management Practices and Problems in Free/Open Source Software Projects
 
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
Software Defect Prediction Techniques in the Automotive Domain: Evaluation, S...
 
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
 
2016 state of industrial internet application development
2016 state of industrial internet application development2016 state of industrial internet application development
2016 state of industrial internet application development
 
05 extended report
05 extended report05 extended report
05 extended report
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 

Viewers also liked

DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
ijsptm
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
ijsptm
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
 
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
ijsptm
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
ijsptm
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
drboon
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 

Viewers also liked (7)

DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 

Similar to CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
ijfcstjournal
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
VESIT/University of Mumbai
 
IT 8003 Cloud ComputingFor this activi.docx
IT 8003 Cloud ComputingFor this activi.docxIT 8003 Cloud ComputingFor this activi.docx
IT 8003 Cloud ComputingFor this activi.docx
vrickens
 
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONSSECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
ijseajournal
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
Jeff Nelson
 
SPS IPC Drives 2015 - Itris Automation paper
SPS IPC Drives 2015 - Itris Automation paperSPS IPC Drives 2015 - Itris Automation paper
SPS IPC Drives 2015 - Itris Automation paper
Itris Automation Square
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
IJECEIAES
 
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CDMACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
IRJET Journal
 
A VNF modeling approach for verification purposes
A VNF modeling approach for verification purposesA VNF modeling approach for verification purposes
A VNF modeling approach for verification purposes
IJECEIAES
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectivekalimullahmohd89
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectivekalimullahmohd89
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
IRJET Journal
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing Organizations
IJCSIS Research Publications
 
Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...
IJECEIAES
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringuniversity of sust.
 

Similar to CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT (20)

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
IT 8003 Cloud ComputingFor this activi.docx
IT 8003 Cloud ComputingFor this activi.docxIT 8003 Cloud ComputingFor this activi.docx
IT 8003 Cloud ComputingFor this activi.docx
 
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONSSECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
SPS IPC Drives 2015 - Itris Automation paper
SPS IPC Drives 2015 - Itris Automation paperSPS IPC Drives 2015 - Itris Automation paper
SPS IPC Drives 2015 - Itris Automation paper
 
publishable paper
publishable paperpublishable paper
publishable paper
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CDMACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
 
A VNF modeling approach for verification purposes
A VNF modeling approach for verification purposesA VNF modeling approach for verification purposes
A VNF modeling approach for verification purposes
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
 
Crime security.
Crime security.Crime security.
Crime security.
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing Organizations
 
Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineering
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

  • 1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 DOI : 10.5121/ijsptm.2016.5301 1 CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shih-Chien Chou Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan ABSTRACT Information flow control (IFC) is useful in preventing information leakage during software execution. Our survey reveals that no IFC model is applied on the entire software development process. Applying an IFC model on the entire software development process offers the following features: (1) viewpoints of all stakeholders (i.e., customers and analysts) can be included and (2) the IFC model helps correcting statements that may leak information during every development phase. In addition that no IFC model is applied to the entire software development process, we failed to identify an IFC model that can reduce runtime overhead. According to the above description, we designed a new IFC model named PrcIFC (process IFC). PrcIFC is applied on the entire software development process. Moreover, PrcIFC is disabled after software testing to reduce runtime overhead. KEYWORDS Software security, information flow control, software development process, reduce runtime overhead 1. INTRODUCTION Information security covers many issues such as cryptography, authentication, and access control. Information flow control (IFC) is a branch of access control. It prevents information leakage during software execution. Information leakage occurs when persons or other software illegally obtain sensitive information from a software system. In general, persons can obtain information from files or output devices and software can obtain information from files. Information leakage may thus happen when sensitive information is output. In the early days, IFC is applied in a single system. In the recent years, IFC has been applied to operating systems [1-3], web services [4-7], and even cloud applications [8-9]. In other words, IFC has been applied to the entire Internet. IFC is thus essential in information security. We involved in the research of IFC for years and identified that no IFC model is applied on the entire software development process. Applying IFC on the entire software development process offers the following features: (1) viewpoints of all stakeholders (i.e., customers and analysts) can be included and (2) the IFC model helps correcting statements that may leak information during every development phase. We also identified that no IFC model take runtime overhead reducing into consideration, in which the overhead is induced by embedding IFC models in software. We thus designed a new IFC model to overcome the problems mentioned above. The design is based on the following considerations:
  • 2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 2 a. Embedding the IFC model into software specifications and design documents. Traditional models are embedded in software only, which may exclude the viewpoints of some stakeholders. b. Executing the specifications and design documents in which the IFC model is embedded. This execution causes the IFC correctness of specifications and design documents to be checked. c. Embedding the IFC model in the software during testing. The testing thus tests both the correctness of functions and IFC. After testing, the model is disabled to remove runtime overhead induced by IFC model. As described in term c above, the IFC model proposed in this paper is disabled after testing. Nevertheless, software that passes the testing is not ensured to be correct. Therefore, the operating system should intercept software output information to ensure security (OS intercepts only output information because only output information may be leaked to persons or other software). In our research, we design the IFC model and let the OS interception as a future work. Since the model is applied in the entire software development process, we name it PrcIFC (process IFC). The core of PrcIFC is the same as NetIFC [10] we designed before. When designing PrcIFC, we ignored the affect of viruses and Trojan horses because they belong to other research areas. During the development of PrcIFC, we identified the following facts. a. Since only output information may be leaked (to persons or other programs), only output statements need to be controlled. As to other statements, the join operation [11] should be used to adjust variable sensitivity after execution. This adjustment prevents possible information leakage when the variable is output later. b. Information should be separated in different group for compatibility. For example, prices with the units of USD and EUR are incomparable. According to the facts, PrcIFC controls output statements and uses join operations to adjust information sensitivity for other statements. PrcIFC presented in this paper offers the following major features: a. PrcIFC is applied on the entire software development process. Therefore, it will not exclude the viewpoints of any stakeholders and helps correcting statements that may leak information during every phase of the development. b. PrcIFC is removed when software is online, which remove runtime overhead. 2. RELATED WORK Traditional lattice-based model [12-13] is a MAC (mandatory access control) which is criticized as too restricted. The decentralized label model [11, 14] uses labels to mark the security levels of variables. A label is composed of policies to be simultaneously obeyed. The model in [15] uses ACLs of objects to compute ACLs of executions. The model Trust-Serv [16] uses state machines to dynamically choose web services at run time. It uses trust negotiation [17] to select web services that can be invoked. The kernel component to determine whether a web service can be invoked is credential. The model proposed in [18] uses digital credentials for negotiation. It defines strategies for negotiation policies. SCIFC [6] uses various mechanism and algorithms to make sure whether a service chain can be successfully invoked.
  • 3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 3 Flume [1] is a decentralized information flow control (DIFC) model for operating systems. It tracks information flows in a system using tags and labels. The control granularity is detailed to processes. The secrecy tags prevent information leakage and integrity tags prevent information corruption. Flume also avoids information leaked to untrusted channel. The function of Laminar [2] is similar to that of Flume. The model proposed in [19] uses X-GTRBAC [20] to control the access of web services. X- GTRBAC can be used in heterogeneous and distributed sites. Moreover, it applies TRBAC [21] to control the factor related to time. The model in [22] uses RBAC (role-based access control) concept [23-24] to define policies of accessing a web service. It is a two-levelled mechanism. The first level checks the roles assigned to requesters and web services. The second level uses parameters as attributes and assigns permissions to the attributes. An authorized requester can invoke a web service only when it possesses the permissions to access the attributes. The model in [25] identifies dependencies among I/O parameters of services to decide whether service invocations will leak information. The model in [26] offers functions to check intra- component information flows through the JIF language [27]. The model in [8] applied the Chinese Wall model [28] to control information flows in the IaaS level. As to services in the SaaS level, the model cannot control their information flows. In the recent survey of [9], the authors especially emphasize the importance of data privacy in a cloud computing environment. They believed that information flow control is a good solution for the problem. However, the article did not propose a concrete information flow control model. According to our survey, no research applies IFC in the entire software development process and almost no one discusses runtime overhead. Figure 1. Design Philosophy Of Prcifc
  • 4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 4 3. PRCIFC Figure 1 depicts the design philosophy of PrcIFC. Before describing Figure 1, we assume that software development tools, such as the UML development platform, are trusted. Therefore, PrcIFC needs not handle possible problems induced by software development tools. Figure 1 shows that we embed PrcIFC in specifications then execute them. To execute a specification, we use our rapid prototyping language [29] to write the specification. That is, we embed PrcIFC in our prototyping language. If a specification passes the test of both functional and IFC requirements, the specification can be designed. Otherwise, the requirement should be re-analyzed. During the design, we use the target language (such as C) to write the design documents and embed PrcIFC in the documents. The documents are then executed and tested. If the design documents pass the test of both functional and IFC requirements, the design document can be implemented. Otherwise, the design activity should be repeated. During implementation, PrcIFC is embedded in the programs. The programs are then executed. If the programs pass the test of both functional and IFC requirements, the programs are released to the customers as a software system. Before the software system is online, PrcIFC is disabled to completely remove the runtime overhead. When the software is online, the OS intercepts the output of the software to check possible information leakage. However, the interception is out of the scope of this paper. According to the description in section 1, information should be associated with a mechanism to represent its sensitivity. The sensitivity should include a security level number and group. Moreover, we need a join operation to adjust the sensitivity of variables in non-output statements. In this regard, we let a variable’s sensitivity be “(Sln, Gv)”, in which Sln is the security level number whereas Gv is the group. We call the sensitivity a security level. Therefore, every piece of information that should be protected is associated with a security level. The definition of security levels results in a lattice. According to the lattice, only output statements are controlled strictly and other statements applies the join operation to adjust the security level of variables. Suppose a piece of information derived from the variable set “{bi | bi is a variable associated with the security level ),(S ii bb Gvlv }” is outputting to the port a (here a port is a device or a file), which is associated with a security level ),(S aa Gvlv . Then, PrcIFC will check the security of the output statement using the following rule Rule 1. ))(()( ababi SlvSlvMAXGpGp ii ≤∧≠∩∩ φ (1) The former part of the rule requires that the output port a and the variables bi in the variable set should be compatible. Otherwise, the outputting is illegal. The latter part requires that the security level number of the output port should be at least the same as the variables in the variable set. This prevents leaking information carried by bi to an output port. As to non-output statement, suppose a piece of information a, which is associated with a security level ),(S aa Gvlv , is derived from the variable set “{bi | bi is a variable associated with the security level ),(S ii bb Gvlv }”. Then, PrcIFC requires that the condition “ )( φ≠∩∩ abi GpGp i ” to be true, which means that the information a and variables bi in the variable sets are compatible. If the condition is true, the following rule is used to adjust the security of the information a. Rule 2. Slva = )( ibSlvMAX (2)
  • 5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 5 4. PROVE OF CORRECTNESS Information leakage may occur during output, including outputting to files and devices. Case 1. Outputting information to a device will not leak information under the control of PrcIFC. Proof. Information output to a device Dv may only leak to persons. Suppose person P possesses a security level number SLVp and SLVp< SlvDv. If Dv and all information sources are in the same group, Rule 1 allows the output only when )( ibSlvMAX ≤ SlvDv. If the output is allowed, P cannot access information output to Dv because SLVp< SlvDv. Since bi derives the information output to Dv, no bi will be leaked to P. Case 2. Outputting information to file will not leak information under the control of PrcIFC. Proof. Information output to a file Fi may be leaked to persons or software. If Fi and all sources are in the same group, Rule 1 allows the output only when )( ibSlvMAX ≤SlvFi. Case 1 above states that no bi will be leaked to a person P with a security level number SLVp and SLVp< SlvFi. On the other hand, if the software Sfi intends to read the information of V from Fi to the variable V1, Rule 2 causes vSlv to be the same as 1vSlv . If Sfi outputs V1 to a device, Case 1 states that V1 will not be leaked to a person. If V1 is output to another file, the proof goes back to the beginning of this proof. However, we know that the information of a sensitive variable may be: (a) operating by a software system, (b) output to a device, or (c) output to a file. Information operating by a software system will not be leaked without output. Information output to a device will not be leaked (see Case 1). As to the information output to a file, it will not be leaked to persons. # 5. EXPERIMENT RESULTS We required students to develop a simple library system using UML as the development model. The target language is C. We organized two groups of students for the experiment, in which every group was consisted of ten students. For the first group, we required students to develop the system without PrcIFC. PrcIFC was embedded in their systems during implementation. That is, the students needed not use the prototyping language to write specifications and needed not use the target language to write design documents. On the other hand, we required students in the other group to follow the process in Figure 1 to develop their software. During software development, we required the students to collect the time they develop documents. During testing, we required students to collect the number of statements that violate PrcIFC. The collected data were then averaged. Table 1 depicts the averaged data, in which the development time of the first group is normalized to one. Table 1. Experiment result Group Requirement analysis time System design time Implementation time Statements violating PrcIFC 1 1 1 1 5.33 2 1.25 1.32 0.69 1.98
  • 6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 6 Table 1 shows that the requirement analysis and design time of the second group was more than that of the first group. This is reasonable because students in the group should write their specifications and design documents using the prototyping language and the target language, respectively. Moreover, PrcIFC should be embedded in the languages. On the other hand, the implementation time of the second group was much less because the design documents had been written in the target language. Moreover, students in the first group should embed PrcIFC in their systems. What we especially concerned is the statements that violate PrcIFC. The experiment result exercises us and we believe that PrcIFC is indeed valuable, because many statements that may leak information have been removed during software development phases before implementation. 6. CONCLUSION Information flow control (IFC) is useful in preventing information leakage during software execution. According to our survey, we cannot identify an IFC model that is applied on the entire software development process. Applying IFC model on the entire software development process will not exclude the viewpoints of any stakeholders. Moreover, statements that may leak information can be identified during every phase of software development. The other problem of traditional IFC models is large runtime overhead. We cannot identify a model that can remove this overhead. According to the description above, we design a new IFC model named PrcIFC (process IFC). It offers the following major features: 1. PrcIFC is applied on the entire software development process. Therefore, it will not exclude the viewpoints of any stakeholders and helps correcting statements that may leak information during every phase of the development. 2. PrcIFC is disabled when software is online, which remove runtime overhead. In the future, we will require students to apply PrcIFC on their exercises for checking the advantages and disadvantages of the model in depth. We hope to improve PrcIFC from the responses of students. REFERENCES [1] M. Krohn, A. Yip, M. Brodsky, and N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, “Information Flow Control for Standard OS Abstractions”, SOSP’07, 2007. [2] I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel, “Laminar: Practical Fine-Grained Decentralized Information Flow Control”, PLDI’09, 2009. [3] N. Zeldovich, S. Boyd-Wickizer, and D. Mazières, “Securing Distributed Systems with Information Flow Control”, NSDI '08, pp. 293–308, 2008 [4] S. –C. Chou and C. –H. Huang, “An Extended XACML Model to Ensure Secure Information Access for Web Services”, Journal of Systems and Software, vol. 83, no. 1, pp. 77-84, 2010. [5] S. –C. Chou, “Dynamically Preventing Information Leakage for Web Services using Lattice”, to appear in 5’th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 2010. [6] W. She, I. –L. Yen, B. Thuraisingham, and E. Bertino, “The SCIFC Model for Information Flow Control in Web Service Composition”, 2009 IEEE International Conference on Web Services, 2009. [7] W. She, I. –L. Yen, B. Thuraisingham, and E. Bertino, “Effective and Efficient Implementation of an Information Flow Control Protocol for Service Composition”, IEEE International Conference on Service- Oriented Computing and Applications, 2009.
  • 7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 3, August 2016 7 [8] R. Wu, G. –J., Ahn, H. Hu, and M. Singhal, “Information Flow Control in Cloud Computing”, Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2010 [9] J. Bacon, D. Eyers, T. F. J. –M. Pasquier, J. Singh, and P. Piezuch, “Information Flow Control for Secure Cloud Computing”, IEEE Trans. Network and Service Management, 11(1), pp. 76-89, 2014. [10] S. -C. Chou, “Controlling Information Flows in Net Services with Low Runtime Overhead”, International Journal of Computer Network and Information Security, vol. 7, no. 3, pp. 1-9, 2015. [11] Myers A., and Liskov, B., 1998. Complete, Safe Information Flow with Decentralized Labels. Proc. 14’th IEEE Symp. Security and Privacy, 186-197. [12] D. E., Denning, 1976. “A Lattice Model of Secure Information Flow”, Comm. ACM, vol. 19, no. 5, 236- 243, 1976. [13] D. E., Denning, P. J., and Denning, Certification of Program for Secure Information Flow”, Comm. ACM, vol. 20, no. 7, 504-513, 1977. [14] Myers A., and Liskov, B., 2000. Protecting Privacy using the Decentralized Label Model. ACM Trans. Software Eng. Methodology, vol. 9, no. 4, 410-442. [15] Samarati, P., Bertino, E., Ciampichetti, A., and Jajodia, S., 1997. Information Flow Control in Object- Oriented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, 524-538. [16] Samarati, P., Bertino, E., Ciampichetti, A., and Jajodia, S., 1997. Information Flow Control in Object- Oriented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, 524-538. [17] Yu, T., Winslett, M., Seamons, K., 2003. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Transactions on Information and System Security, vol. 6, no. 1, 1-42. [18] Koshutanski, H., Massacci, F., 2005. Interactive Credential Negotiation for Stateful Business Processes, Lecture notes in computer science, 256-272. [19] Bhatti, R., Bertino, E., Ghafoor, A., 2004. A Trust-based Context-aware Access Control Model for Web Services. IEEE ICW’04, 184 – 191. [20] Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J. B. D., 2005. X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control. ACM Transactions on Information and System Security (TISSEC), Vol. 8, No. 2, 187 – 227. [21] Bertino, E., Bonatti P. A., Ferrari, E., 2001. TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security, Vol. 4, No. 3, 191 – 233. [22] Wonohoesodo R., Tari, Z., 2004. A Role Based Access Control for Web Services. Proceedings of the 2004 IEEE International Conference on Service Computing, 49-56. [23] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E., 1996. Role-Based Access Control Models. IEEE Computer, vol. 29, no. 2, 38-47. [24] R. Sandhu, D. F., Ferraiolo, and D. R., Kuhn, D. "The NIST Model for Role Based Access Control: Toward a Unified Standard", 5th ACM Workshop Role-Based Access Control. pp. 47–63, 2000 [25] W. She, I. -L. Yen, B. ThuraiSingham, and S. –Y. Huang, “Rule-Based Run-Time Information Flow Control in Service Cloud”, 2011 IEEE International Conferences on Web Services, pp. 524-531, 2011. [26] L. Sfaxi, T. Abdellatif, R. Robbana, and Y. Lakhnech, “ Information Flow Control of Component-Based Distributed Systems”, Concurrency and Computation: Practice and Experience, available on http://www.bbhedia.org/robbana/Wiley.pdf [27] JIF website, “Jif: Java + information flow”, available on http://www.cs.cornell.edu/jif/ [28] Brewer, D.F.C., Nash, M.J., 1989. The Chinese Wall Security Policy. In: Proceedings of the 5’th IEEE Symposium on Security and Privacy, 206-214. [29] S. -C. Chou, “A Prototyping Technique to Verify Requirements”, ICS 2002, Hualien, Taiwan. AUTHORS Shih-Chien Chou is currently a professor in the Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan. His research interests include software engineering, process environment, software reuse, and information flow control.