University of Minnesota
Program Analysis for Security
index.php

Policy inference and privilege separation

David Brumley and Dawn Song. “Privtrans: Automatically partitioning programs for privilege separation”. In USENIX Security Symposium, pages 57–72, San Diego, CA, USA, August 2004.
[USENIX]

William R. Harris, Somesh Jha, and Thomas W. Reps. “DIFC programs by automatic instrumentation”. In ACM Conference on Computer and Communications Security (CCS), pages 284–296, Chicago, IL, USA, October 2010.
[ACM]

Question: TBD

Optional

Jeffrey A. Vaughan and Stephen Chong. “Inference of expressive declassification policies”. In IEEE Symposium on Security and Privacy “Oakland”, pages 180–195, Oakland, CA, USA, May 2011.
[IEEE]

This paper looks at a similar high-level goal and domain of subjects (small Java programs) and JFlow and Jif, but takes a quite different approach. They use an automatic analysis to infer an end-to-end description of what information is revealed when.