An Information Flow Security Logic for Permission-Based Declassification Strategy

Zhenheng Dong, Yongxin Zhao, Qiang Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the increasing popularity of smartphones and the rapid development of mobile network, ensuring the security of mobile applications becomes more and more important, which has received substantial attention from both academia and industry. Information flow security, as a prominent approach to system and network security, aims at ensuring high security level information would not be accessed by analyzing the information with lower security levels. In this paper, we design a novel information flow security logic to reason about the security of mobile applications, leveraging on the idea of permission based declassification. Firstly, we propose a formal language with permission check branches, through which the access to the confidential information can be controlled. Then we present our novel information flow security logic based on the permission based declassification strategy, which can make the reasoning more precise by degrading the security level of the specific information. Finally, we demonstrate the usability of our logic via examples.

Original languageEnglish
Title of host publicationSEKE 2022 - Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering
PublisherKnowledge Systems Institute Graduate School
Pages519-524
Number of pages6
ISBN (Electronic)1891706543, 9781891706547
DOIs
StatePublished - 2022
Event34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022 - Pittsburgh, United States
Duration: 1 Jul 202210 Jul 2022

Publication series

NameProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
ISSN (Print)2325-9000
ISSN (Electronic)2325-9086

Conference

Conference34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022
Country/TerritoryUnited States
CityPittsburgh
Period1/07/2210/07/22

Keywords

  • Formal Language and Logic
  • Information Flow Security
  • Mobile Applications
  • Permission-Based Declassification

Fingerprint

Dive into the research topics of 'An Information Flow Security Logic for Permission-Based Declassification Strategy'. Together they form a unique fingerprint.

Cite this