Next Article in Journal
Mathematical Models for Simulation and Optimization of High-Flux Solar Furnaces
Previous Article in Journal
Analysis of a Model of Leishmaniasis with Multiple Time Lags in All Populations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bisimulation for Secure Information Flow Analysis of Multi-Threaded Programs

Department of Computer Science, University of Tabriz, Tabriz 51666-16471, Iran
*
Author to whom correspondence should be addressed.
Math. Comput. Appl. 2019, 24(2), 64; https://doi.org/10.3390/mca24020064
Submission received: 5 May 2019 / Revised: 31 May 2019 / Accepted: 3 June 2019 / Published: 17 June 2019

Abstract

:
Preserving the confidentiality of information is a growing concern in software development. Secure information flow is intended to maintain the confidentiality of sensitive information by preventing them from flowing to attackers. This paper discusses how to ensure confidentiality for multi-threaded programs through a property called observational determinism. Operational semantics of multi-threaded programs are modeled using Kripke structures. Observational determinism is formalized in terms of divergence weak low-bisimulation. Bisimulation is an equivalence relation associating executions that simulate each other. The new property is called bisimulation-based observational determinism. Furthermore, a model checking method is proposed to verify the new property and ensure that secure information flow holds in a multi-threaded program. The model checking method successively refines the Kripke model of the program until the quotient of the model with respect to divergence weak low-bisimulation is reached. Then, bisimulation-based observational determinism is checked on the quotient, which is a minimized model of the concrete Kripke model. The time complexity of the proposed method is polynomial in the size of the Kripke model. The proposed approach has been implemented on top of PRISM, a probabilistic model checking tool. Finally, a case study is discussed to show the applicability of the proposed approach.

1. Introduction

The increase in number and variety of security attacks on computing systems amplifies the need for improvement in protection mechanisms against the security attacks. Most of these attacks target the confidentiality of sensitive information.
Cryptography, access control and firewalls are common protection mechanisms against the attacks on confidentiality. These mechanisms allow access (read or write) to the secret information for authorized users only. However, once access to secret information is granted for an authorized user, they do not have control over how the information is used. They have no technique to verify and prevent the flow of secret information to unauthorized users. For example, consider an android game with in-app purchase capability. While installing this app, it asks for permission to access the Internet and credit card information (for in-app purchases, like buying additional coins). Once an android user allows these permissions, they have no way to ensure that the credit card information is used in a legal manner and are not sent to an unauthorized server. This is an example of information flows, which potentially result in dangerous types of attacks, such as code injection or sensitive information leakage [1].
To avoid information flows and stop information leakages, secure information flow has been introduced. Secure information flow is a security mechanism for verifying and ensuring that secret information in a program does not flow to unauthorized users. It assigns two security levels to program variables: some variables are assigned public (low) security level and some are assigned secret (high) security level. The attacker, in secure information flow context, is supposed to know the source code of the program and is able to execute the program and observe values of the public variables. Secure information flow seeks to detect information flows from secret variables to public ones [2,3].
For example, consider the program l:=h, where h is a secret variable and l is a public variable. This program has a direct flow, since the attacker can infer secret information (h) by observing the public variable (l). As another example, consider the program if h>0 then l:=-5 else l:=5, which has an indirect flow. The attacker can infer some secret information (h being positive or not) by observing the value of l. Verifying confidentiality of multi-threaded programs and ensuring secure information flows is the main motivation of this paper.
To ensure secure information flow in multi-threaded programs, a confidentiality property needs to be formalized and a verification method is needed to check whether the program satisfies the property or not.
A commonly used confidentiality property to ensure secure information flow for concurrent programs is Observational determinism [4,5,6]. It requires the program to appear deterministic to an attacker capable of observing values of the public variables during the program execution. There are various definitions of observational determinism [6,7,8,9,10,11]. However, the time complexity of verifying most of these properties is exponential in the size of the state space of the program [10]. Furthermore, they are not restrictive enough in some security contexts to thoroughly avoid information leakages.
In this paper, an automatic approach is proposed to analyze secure information flow for multi-threaded programs. The proposed approach consists of two main parts: (1) a new formalization, Bisimulation-based Observational Determinism (BOD), for specifying secure information flow for multi-threaded programs (Section 4.1) and (2) a polynomial-time algorithm for verifying BOD to ensure that BOD holds in a multi-threaded program (Section 4.2).
Kripke structures are used to model program behavior. Any path in the Kripke structure corresponds to an execution of the program that the Kripke structure is modeling. The sequence of public values of each path denotes a public behavior that is observable by the attacker. We define an equivalence relation, called divergence weak low-bisimulation, between paths of the Kripke structure. Divergence weak low-bisimulation requires paths of the program to affect the public variables in the same way. We formalize BOD using divergence weak low-bisimulation and show that a program satisfies BOD, if and only if all paths that have the same initial public value are divergence weak low-bisimilar. Thus, paths that have the same initial public value pass through the same equivalence classes of states but not at the same time, that is, BOD allows some paths to run slower than others. BOD is defined language- and scheduler-independent.
To verify BOD, a sound model checking method is proposed. The method chooses an arbitrary path for all paths having low-equivalent initial states. BOD requires divergence weak low-bisimilarity between each arbitrary path and the corresponding paths in the program. The method computes a divergence weak low-bisimulation quotient of the program, which is an abstract model of the program and consists of equivalence classes under divergence weak low-bisimulation. We show that BOD is satisfied if and only if initial states of each arbitrary path and the corresponding paths in the program are in the same equivalence classes. The time complexity of computing the quotient and hence verifying BOD is polynomial in the size of the program model.
In summary, our contributions include (1) formalizing observational determinism using a bisimulation foundation, (2) a verification algorithm for checking observational determinism.
The remainder of the paper is structured as follows. Section 2 discusses preliminaries and assumptions made throughout the paper. Section 3 discusses previous work. In Section 4, the proposed approach is explained. In this section bisimulation-based confidentiality property is formally defined using low-bisimulation and then the verification is explained in detail. Finally, Section 5 concludes by a discussion on future work.

2. Preliminaries and Assumptions

A security analysis should include a model for program, attacker and property [12]. Program and attacker models along with preliminaries for formalizing the property are explained in this section. The confidentiality property for specifying requirements is defined in Section 4.1.

2.1. Program Model

We model a program as a set of concurrently running threads with a memory shared across the threads. Kripke structures are utilized to model multi-threaded programs and paths are used to model program behavior (executions).
Definition 1
(Kripke structure). A Kripke structure K is a tuple ( S , , I , A P , V ) where S is a set of states, S × S is a transition relation, I S is a set of initial states, A P is the set of possible values of the public variables and V : S 2 A P is a labeling function.
K is called finite if S and A P are finite. The set of successors of a state s is defined as P o s t ( s ) = { s S | s s } . A state s is called terminal if P o s t ( s ) = . For a Kripke structure modeling a sequential program, terminal states represent the termination of the program.
Definition 2
(Path). An path fragment π ^ of K is a finite state sequence s 0 s 1 s n such that s i P o s t ( s i 1 ) for all 0 < i n or an infinite state sequence s 0 s 1 s 2 such that s i P o s t ( s i 1 ) for all 0 < i . An path of K is a path fragment that starts in an initial state and is either finite, ending in a terminal state or infinite.
The first state of the path π = s 0 s 1 s 2 is extracted by π [ 0 ] , that is, π [ 0 ] = s 0 . P a t h s ( s ) denotes the set of paths starting in s and P a t h s ( K ) the set of paths of the initial states of K : P a t h s ( K ) = s I P a t h s ( s ) . Suppose I is a subset of I; Then, P a t h s ( I ) = s I P a t h s ( s ) .
A trace of a path π = s 0 s 1 is defined as T = t r a c e ( π ) = V ( s 0 ) V ( s 1 ) . Two traces T 1 and T 2 over 2 A P are stutter equivalent, denoted T 1 T 2 , if they are both of the form A 0 + A 1 + A 2 + for A 0 , A 1 , A 2 , A P where A i + is the Kleene plus operation on A i and is defined as A i + = { x 1 x 2 x k | k > 0 and each x i = A i } . A finite trace t 1 is called a prefix of t, if there exists another infinite trace t 2 such that t 1 t 2 = t . Two traces are prefix & stutter equivalent, if one is stutter-equivalent to a prefix of another.
Two Kripke structure can be combined in a single composite Kripke structure.
Definition 3
(Composite Kripke structure  K 1 K 2 ). For K i = ( S i , i , I i , A P , V i ) , i = 1 , 2 : K 1 K 2 = ( S 1 S 2 , 1 2 , I 1 I 2 , A P , V ) where stands for disjoint union and V ( s ) = V i ( s ) if s S i .
  Let us assume K = ( S , , I , A P , V ) is a Kripke structure that models executions of a multi-threaded program, with all possible interleavings of the threads. A state of K indicates the current values of all variables together with the current value of the program counter that indicates the next program statement to be executed. Execution steps of the program are modeled by the transition relation. In case a state has more than one outgoing transition, the next execution step (transition) is chosen in a purely non-deterministic fashion. In consequence, executions result from the resolution of the possible non-determinism in the program. This resolution is performed by a scheduler. A scheduler chooses in any state s one of the enabled transitions according to a scheduling policy. Probabilistic choices are not considered, that is, the scheduler is possibilistic. A P is the set of values of the public variables and the function V labels each state with these values. If K has a terminal state s n , we include a transition s n s n , that is, a self-loop, ensuring that the Kripke structure has no terminal state. Therefore, all paths of K are infinite. It is assumed that the state space of the Kripke structure of the program and the shared memory used by the threads are finite.
As an example of program modeling, consider the following program which consists of two threads
 l:=0;
 l:=1  ||  if l=1 then l:=h                          (P1)
Suppose that h is a one-bit secret variable, l is a one-bit public variable and || is the parallel operator. Two threads are secure if they are executed separately but concurrent execution of the two threads might leak the value of h into l. The Kripke structure of the program is depicted in Figure 1.
In this Kripke structure, the state space is S = { s 0 , s 1 , , s 8 } . The set of initial states consists of two states, that is, I = { s 0 , s 5 } . The set of transitions is { s 0 s 1 , s 1 s 3 , , s 7 s 8 , s 8 s 8 } . The set of possible values of the public variable is A P = { 0 , 1 } . States s 0 , s 1 , s 4 , s 5 and s 6 are labeled with { 0 } and states s 2 , s 3 , s 7 and s 8 are labeled with { 1 } . The set of paths of the program is { s 0 s 1 s 3 ω , s 0 s 2 s 4 ω , s 5 s 6 s 8 ω , s 5 s 7 s 8 ω } , where ω denotes infinite iteration.

2.2. Attacker Model

Secure information flow is a security mechanism for establishing program confidentiality. The sufficiency of information flow depends on the attacker model. This model defines the capabilities of the attacker, such as being able to observe program output, read program code or even inject code in the program. These capabilities may lead to information flow channels that transfer secret information to the attacker. Examples of such channels are direct, indirect, termination behavior, probabilistic, internally observable timing, externally observable timing [13], injection and power [14].
Direct flows are caused when the value of a secret variable is directly assigned to a public variable. Indirect flows are caused by the control structure of the program. Termination flows leak information through the termination or non-termination of a program execution [3]. Probabilistic channels signal secret information through the probabilistic behavior of the program. Internally observable timing flows are created when secret information influences the timing behavior of a thread, which, through the scheduler, influences the execution order of assignments to public variables [15]. Externally observable timing flows are caused when secret information influences the timing behavior of the program. Injection flows signal information when an attacker is able to inject her desired code in the program [14]. Power channels leak information via the power consumed to execute an action dependent on secret information, assuming the attacker can measure this consumption [3].
Which of these channels are a concern depends strongly on the specific context and on the power of the attacker, that is, on the observations she is able to make. We suppose that the attacker has the knowledge of the program’s source code, is able to choose a scheduling policy, run the program and observe program traces.
We assume a shared memory for the multi-threaded program, where public values are stored and the attacker has read access to it. Stating in terms of Kripke structures, the attacker can only observe state labels. We also assume that the attacker can not access other memory areas, including secret variables (i.e., access control and memory protection works correctly). We aim to detect direct, indirect and internal timing leaks.

2.3. Low-Bisimulation

In this section, low-bisimulation and variations of it are formally defined. These definitions will be used in the next section to formalize observational determinism. Execution (path) indistinguishability is a key requirement for preventing information leaks in concurrent programs [6]. Bisimulation is a widely-used foundation for execution indistinguishability and thus for characterizing security for multi-threaded programs (e.g., References [13,16,17,18]).
We assume the attacker can observe the state labels and cannot distinguish those states that have the same label but might have different secret values. This observational capability of the attacker is formalized by the following relation.
Definition 4
(Low-equivalent states). A state s is low-equivalent to another state s , written s = L s , if  V ( s ) = V ( s ) .
We believe a program is secure if all executions (paths) having low-equivalent initial states are divergence weak low-bisimilar. Thus, we define observational determinism in terms of divergence weak low-bisimulation. For further clarity on the concept of divergence weak low-bisimulation, we first define weak low-bisimulation. Weak low-bisimulation is defined as a relation between states of a Kripke structure and requires for low-equivalent states that each transition is matched by a (suitable) path fragment.
Definition 5
(Weak low-bisimulation L). Let K = ( S , , I , A P , V ) be a Kripke structure. A weak low-bisimulation for K is a binary relation R on S such that for all s 1 R s 2 , the following three conditions hold:
1.
s 1 = L s 2 .
2.
If s 1 P o s t ( s 1 ) with ( s 1 , s 2 ) R , then there exists a finite path fragment s 2 u 1 u n s 2 with n 0 and s 1 R u i , i = 1 , , n and s 1 R s 2 .
3.
If s 2 P o s t ( s 2 ) with ( s 1 , s 2 ) R , then there exists a finite path fragment s 1 v 1 v n s 1 with n 0 and V i R s 2 , i = 1 , , n and s 1 R s 2 .
States s 1 and s 2 are weak low-bisimilar, denoted s 1 L s 2 , if there exists a weak low-bisimulation R for K with s 1 R s 2 .
Weak low-bisimulation is defined as a relation between states within a single Kripke structure. An alternative perspective is to consider low-bisimulation as a relation between two Kripke structures. This enables comparing different Kripke structures. Take Kripke structures K 1 and K 2 and combine them in a single composite Kripke structure K 1 K 2 (see Definition 3). Then, K 1 L K 2 if and only if, for every initial state s 1 of K 1 , there exists a weak low-bisimilar initial state s 2 of K 2 , and vice versa.
Two Kripke structures can be weak low-bisimilar (initial states can be weak low-bisimilar) but may not produce indistinguishable paths. This is caused by stutter paths, that is, paths that stay forever in an equivalence class without performing any visible step. This behavior is called divergent. We would like to adapt weak low-bisimulation such that states may only be related if they both exhibit divergent paths or none of them has a divergent path. This yields a variant of weak low-bisimulation called divergence weak low-bisimulation.
Definition 6
(Divergence weak low-bisimulation  L d i v [19]). Let R be an equivalence relation on S. A state s S is R-divergent if there exists an infinite path fragment π = s s 1 s 2 P a t h s ( s ) such that s R s j for all j > 0 . Stated in words, a state s is R-divergent if there is an infinite path starting in s that only visits states in [ s ] R . [ s ] R is the equivalence class of s under the equivalence relation R. R is divergence-sensitive if for any s 1 R s 2 : if s 1 is R-divergent, then s 2 is R-divergent. States s 1 , s 2 are divergence weak low-bisimilar, denoted s 1 L d i v s 2 , if there exists a divergence sensitive weak low-bisimulation R such that s 1 R s 2 .
We defined L d i v between two states. It can also be defined between two paths.
Definition 7
(Divergence weak low-bisimilar paths [19]). For infinite path fragments π i = s 0 , i s 1 , i s 2 , i , i = 1 , 2 in K , π 1 is divergence weak low-bisimilar to π 2 , denoted π 1 L d i v π 2 if and only if there exists an infinite sequence of indexes 0 = j 0 < j 1 < j 2 < and 0 = k 0 < k 1 < k 2 < with:
s j , 1 L d i v s k , 2 f o r a l l j r 1 j < j r a n d k r 1 k < k r w i t h r = 1 , 2 ,
The following lemma asserts that divergence stutter low-bisimilar states produce paths that are divergence stutter low-bisimilar. It also asserts that initial states of divergence stutter low-bisimilar paths are themselves divergence stutter low-bisimilar. The fact that L d i v can be lifted from states to paths and vice versa will used in proving the correctness of the verification algorithm in Section 4.2.
Lemma 1.
Divergence weak low-bisimilar states have divergence weak low-bisimilar paths and vice versa:
s 1 L d i v s 2 i f f π 1 P a t h s ( s 1 ) ( π 2 P a t h s ( s 2 ) . π 1 L d i v π 2 )
Proof. 
See Baier and Katoen [19], page 550. □
Divergence weak low-bisimulation is an equivalence and partitions the set of states of a Kripke structure into equivalence classes. The result is called the quotient Kripke structure. For a state set S and an equivalence R, [ s ] R = { s S | ( s , s ) R } defines the equivalence class of the state s S under R. The quotient Kripke structure with respect to L d i v is defined as follows.
Definition 8 
(Divergence weak low-bisimulation quotient  K / L d i v ). The divergence weak low-bisimulation quotient of a Kripke structure K is defined by K / L d i v = ( S / L d i v , , I , A P , V ) , where S / L d i v = { [ s ] L d i v | s S } , V ( [ s ] L d i v ) = V ( s ) , I = { [ s ] L d i v | s I } and is defined by
s s s ¬ L d i v s [ s ] L d i v [ s ] L d i v a n d s i s L d i v d i v e r g e n t [ s ] L d i v [ s ] L d i v

3. Related Work

In the literature, there are various definitions of observational determinism. These definitions formalize determinism in terms of various forms of stutter equivalence of the program executions, such as prefix and stutter equivalence on traces of each public variable [6], stutter equivalence on traces of each public variable [7], prefix and stutter equivalence on traces of all public variables together [8], stutter equivalence on traces of all public variables [9,20], scheduler-specific stutter equivalence on traces of each public variable and also traces of all public variables together [10] and equivalence to public operations [11].
For most of these definitions, model checking algorithms have been presented to verify them [7,9,10]. Huisman and Blondeel [9] specify observational determinism in modal μ -calculus. They use Concurrency Workbench (CWB) as the model checking tool. They encode the self-composed program and modal μ -calculus formulation of observational determinism in CWB’s specification language. Dabaghchian and Abdollahi [20] specify observational determinism in Linear Temporal Logic. They encode the self-composed program and LTL formula in the PROMELA specification language, using the SPIN model checker. Ngo et al. [10] present two bisimulation-based algorithms to verify observational determinism. These model checking methods have exponential time complexity, while BOD requires polynomial time complexity. BOD is a little more restrictive than these definitions, as it uses divergence weak low-bisimulation (Divergence weak low-bisimulation implies stutter equivalence but the reverse does not necessarily hold (See Baier and Katoen [19], page 549).). This restriction is not bad, as most applications require strict confidentiality properties in order to avoid leakage of sensitive information.
Giffhorn and Snelting [21] define observational determinism in terms of low-equivalence on public operations and present a program analysis algorithm for verifying it. The algorithm models concurrent programs as dependence graphs. In a program dependence graph, nodes represent program statements and edges represent data and control dependencies. Giffhorn and Snelting’s definition of observational determinism is based on traces which consist of read/write operations and memory values and are enriched with control and data dependencies. This is different from our definition of BOD and many other definitions of observational determinism, in which traces are defined using public variable values.
Another widely-used scheduler-independent property is strong security, introduced by Sabelfeld and Sands [13]. They define a partial equivalence relation, called strong low-bisimulation, that relates two multi-threaded programs, with the same number of threads, only if they execute in lock-step and affect the public variables in the same manner. Then, a multi-threaded program satisfies strong security if it is related to itself. Strong security is too strong and requires step-by-step indistinguishability, which implies, many intuitively secure programs are rejected. Compared to strong security, BOD is much more permissive on harmless programs.
Mantel and Sudbrock [16] propose Flexible Scheduler-Independent (FSI) Security for multi-threaded programs. They partition threads of the program into high threads that definitely do not modify public variables and public threads that potentially modify public variables. An order-preserving bijection, called low matching, is defined to map the positions of public threads in two multi-threaded programs. Then, they define a partial equivalence relation, called low-bisimulation modulo low matching, which relates two multi-threaded programs, with the same number of threads, if each step of a public thread in one execution is matched by a step of the matching public thread in the other execution. Thus, a multi-threaded program is FSI-secure if it is related to itself. FSI-security is less restrictive than strong security but is language-dependent. Note that BOD is language-independent.
Type systems have been widely used for verifying secure information flow properties [8,13,16,18,22,23,24]. They are language-dependent, in the sense that a simple language is considered and the confidentiality property is defined using the semantics of this language. Type systems are useful because they support automated, compositional verification. However, they are not extensible, as they are language-dependent and for each change in the program language or the security property, a new type system needs to be defined and proven sound [25]. On the other hand, security requirements are subject to dynamic changes. Accordingly, we use algorithmic verification and model checking, instead of type systems to verify secure information flow.
Another verification approach for information flow properties is to extend temporal logics and introduce new logics to specify these properties. HyperLTL [26] is a recently introduced temporal logic, which is an extension of Linear-time Temporal Logic (LTL) [27]. Runtime verification of information flow properties, including observational determinism, using HyperLTL is discussed in [28,29]. Verifying BOD using HyperLTL would be an interesting future work.

4. The Proposed Approach

The proposed approach for verifying observational determinism consists of two main parts: (1) a new formalization, Bisimulation-based Observational Determinism (BOD), for specifying secure information and (2) an algorithm for verifying BOD. BOD is discussed in Section 4.1 and the verification is explained in Section 4.2.

4.1. Bisimulation-Based Observational Determinism

Observational determinism needs to ensure that as secret inputs change, public behavior of the program remains unchanged. Thus, it requires paths with low-equivalent initial states to be indistinguishable [6]. We characterize indistinguishability of paths by divergence weak low-bisimulation.
Definition 9 
(BOD). A multi-threaded program M T satisfies BOD with respect to all public variables, if and only if
π , π P a t h s ( K ) . π [ 0 ] = L π [ 0 ] π L d i v π
where K denotes the Kripke structure of the program M T , = L is state low-equivalence relation, and  L d i v is divergence weak low-bisimulation relation. BOD is acronym for Bisimulation-based Observational determinism.
Stated in words, BOD requires two initial states that have the same public data but different secret data, to produce paths that visit the same sequence of L d i v -equivalence classes and affect the public variables in the same sequence. This implies weak stepwise indistinguishability, by which direct, indirect and internally observable timing flows are detected. Termination behavior flows are eliminated by adding self-loops to terminal states. As discussed earlier, paths of the program result from the resolution of the possible non-determinism in the program and the probability of a path is not considered. This research hence does not consider probabilistic flows. In order to handle externally observable timing flows, the confidentiality property must be too restrictive, ensuring that the execution time does not depend on secret inputs. Requiring a high degree of restriction causes rejection of many intuitively secure programs and harms the precision of the property. That is why BOD does not impose a high degree of restriction. A confidentiality property should be as restrictive as possible in the sense that it does not accept leaky programs and should be permissive enough, such that it does not reject intuitively secure programs.
As an example of information flow analysis using BOD, consider the following program
 l:=0; h:=l+3; l:=l+1                                      (P2)
The program is intuitively secure because h is not read. The Kripke structure of the program is depicted in Figure 2.
It has just one path s 0 s 1 s 2 ω . Thus, P2 satisfies BOD. As another example, consider the following secure program in which l is not updated
 if l>0 then h:=h+1
         else h:=0                                     (P3)
This program is clearly BOD-secure, because for each value of l, the Kripke structure has one state with a self-loop.
For insecure examples, consider the program P (Figure 1). Two threads are secure if they are executed separately. However, concurrent execution of the two threads might leak the value of h into l. The paths of this program are not divergence weak low-bisimilar and hence not BOD-secure. As another example, consider the following program
 l:=0; while h>0 do {l++; h--}                                 (P4)
This program is insecure and leaks the value of h into l. The Kripke structure of the program is shown in Figure 3.
The set of paths is { s 0 ω , s 1 s 2 ω , s 3 s 4 s 5 ω , } . These paths are not divergence weak low-bisimilar and thus BOD correctly recognizes the program as insecure. For an example of externally observable timing flow, consider the following program
 l:=0; if h>0 then l:=1
          else {sleep 100; l:=1}                             (P5)
where sleep 100 means 100 consecutive skip commands. The Kripke structure of the program is depicted in Figure 4.
Paths produced are s 0 s 1 ω and s 2 s 3 s 102 s 103 ω , which are divergence weak low-bisimilar. Therefore, BOD (incorrectly) classifies the program as secure, while the program has external timing leak. As discussed earlier, BOD (and all other definitions of observational determinism) do not try to detect external timing leaks and avoid them.
For an example of internally observable timing flow, consider the following insecure program
 l:=0
 l:=2  ||  (if h=1 then sleep 100); l:=1                        (P6)
A part of the Kripke structure is depicted in Figure 5.
Due to the fact that, for example, two paths s 0 s 1 s 2 s 3 ω and s 0 s 4 s 5 s 6 ω are not divergence weak bisimilar, BOD correctly recognizes the program as insecure.

4.2. Verifying BOD

Here we discuss the proposed model checking algorithm for BOD verification. First, an arbitrary path π i is extracted for each set of low-equivalent initial states and L d i v is checked between the arbitrary path π i and each path starting in these low-equivalent initial states.
A main step of the verification algorithm is to construct the quotient structure of the program w.r.t L d i v . Divergence weak low-bisimulation quotient is an abstraction of the Kripke structure and by considering it, enormous state-space reductions may be obtained [19]. We use an abstraction refinement technique to compute the quotient structure.

4.2.1. The Algorithm

The main steps of the verification algorithm are outlined in Algorithm 1.
Algorithm 1 Verification of BOD
  • Input: finite Kripke structure K modeling the program
  • Output:true if the program satisfies BOD; Otherwise, false
  • Partition I into initial state blocks I S C 0 ,, I S C m ;
  • Define I S C = { I S C 0 , , I S C m } ;
  • Take an arbitrary path π i P a t h s ( I S C i ) for each I S C i ( i = 0 , , | I S C | 1 ) ;
  • Construct Kripke structure KP i from π i ;
  • Construct Kripke structure KP m i n = KP 0 KP 1 KP | I S C | 1 ;
  • Construct Kripke structure K = K KP m i n ;
  • Compute divergence weak low-bisimulation quotient K / L d i v ;
  • for each initial state block I S C i and the corresponding path π i do
  •      c l a s s i = [ π i [ 0 ] ] L d i v ; /* equivalence class of π i [ 0 ] w.r.t. L d i v */
  •     if I S C i ¬ c l a s s i then
  •         return false
  •     end if
  • end for
  • return true
The input of the algorithm is a finite Kripke structure K = ( S , , I , A P , V ) modeling the program and the output is true or false. I is partitioned into sets of low-equivalent initial states called initial state blocks I S C 0 ,, I S C m and I S C = { I S C 0 , , I S C m } is defined. An arbitrary path π i P a t h s ( I S C i ) is extracted from K for each I S C i and a Kripke structure KP i is built from π i . Kripke structures KP i ( i = 0 , , | I S C | 1 ) are combined, forming a single Kripke structure KP m i n = ( S KP m i n , KP m i n , I KP m i n , A P KP m i n , V KP m i n ) , where KP m i n = KP 0 KP 1 KP | I S C | 1 . Kripke structure K = ( S , , I , A P , V ) is also constructed, where K = K KP m i n and quotient of K w.r.t. L d i v is computed. Then, K satisfies BOD iff
i { 0 , , | I S C | 1 } . I S C i [ π i [ 0 ] ] L d i v
where [ π i [ 0 ] ] L d i v denotes the equivalence class of π i [ 0 ] in K / L d i v . Stated in words, K satisfies BOD if after computing the divergence weak low-bisimulation quotient of K = K KP m i n , all initial states of an initial state block and the initial state of the corresponding arbitrary path belong to the same equivalence class.
Now we discuss the main steps of Algorithm 1.
Taking an arbitrary path. To take an arbitrary path from K , a depth-first search is done. The search starts from an initial state and stops at a terminal state (a state with a self-loop).
Computing the divergence weak low-bisimulation quotient. Before explaining how to compute the quotient with respect to L d i v , some definitions are provided.
Definition 10 
(Stutter cycle). A stutter cycle is a cycle s 0 s 1 s n in K such that s 0 = L s i for i = 1 , , n .
Definition 11 
(Divergence-sensitive Expansion  K ¯ ). The divergence-sensitive expansion of finite Kripke structure K = ( S , , I , A P , V ) is K ¯ = ( S { s d i v } , , I , A P { d i v } , V ¯ ) , where s d i v S , → extends the transition relation of K by the transitions s d i v s d i v and s s d i v for every state s S on a stutter cycle in K and V ¯ ( s ) = V ( s ) if s S and V ¯ ( s d i v ) = { d i v } .
In order to compute the quotient with respect to L d i v , K is transformed into divergence-sensitive expansion K ¯ such that the equivalence classes under L in K ¯ coincide with the equivalence classes under L d i v in K . To construct divergence-sensitive expansion, all states on a stutter cycle must be determined, as a transition from each of these states to s d i v will be added. This is done by finding the strongly connected components (SCCs) in K that only contain stutter steps (Transition s s is a stutter step if s = L s .). The latter can be carried out using a depth-first search algorithm. Then, computation of the quotient with respect to L d i v is reduced to the problem of computing the quotient with respect to L . The algorithm proposed by Groote and Vaandrager [30] is used to compute the quotient of K ¯ with respect to L . The algorithm starts by partitioning the state space based on the low-equivalence relation. Thus, the first partition contains blocks of low-equivalent states. Then, each block is refined based on the set of reachable states from the block. Refinement continues until no refinement is possible and the blocks are stable. For more details of the algorithm please refer to Groote and Vaandrager [30] and Baier and Katoen [19]. Finally, K / L d i v is obtained from K ¯ / L by replacing the transitions s s d i v in K ¯ with self-loops [ s ] L d i v [ s ] L d i v and removing the state s d i v .

4.2.2. Correctness of the Algorithm

Correctness of Algorithm 1 is proven by the following theorem. Algorithm 1 is correct when it returns true if and only if the input Kripke structure satisfies BOD, otherwise returns false.
Theorem 1.
A Kripke structure K satisfies BOD iff
i { 0 , , | I S C | 1 } . I S C i [ π i [ 0 ] ] L d i v
Proof. 
Given K = ( S , , I , A P , V ) , BOD requires that all path starting in low-equivalent initial states are divergence weak low-bisimilar. To prove BOD, for each I S C i ( i = 0 , , | I S C | 1 ) an arbitrary path π i P a t h s ( I S C i ) is extracted and divergence weak low-bisimilarity between π i and each path σ P a t h s ( I S C i ) is checked. π i is divergence weak low-bisimilar to σ , if and only if π i [ 0 ] is divergence weak low-bisimilar to σ [ 0 ] . The latter fact is developed as a result of Lemma 1. Then, π i [ 0 ] is divergence weak low-bisimilar to each σ [ 0 ] , if and only if
C S / L d i v . π i [ 0 ] C σ [ 0 ] C
where S / L d i v is the quotient of S w.r.t L d i v , which is an equivalence class. Note that all states of an initial state cluster should have divergence weak low-bisimilar paths and hence belong to the same equivalence class. The above condition ensures the latter too.
Thus, BOD requires that all initial states of an initial state block I S C i and the initial state of the corresponding arbitrary path π i belong to the same block in K / L d i v . Then, K satisfies BOD, iff
i { 0 , , | I S C | 1 } . I S C i [ π i [ 0 ] ] L d i v
where [ π i [ 0 ] ] L d i v denotes the equivalence class of π i [ 0 ] in K / L d i v . □

4.2.3. Complexity of the Algorithm

Assume t is the number of transitions of K . The time complexity of taking an arbitrary path is O ( t + | S | ) . Thus, the time complexity of constructing KP m i n is O ( | I | ( t + | S | ) ) . The time complexity of determining SCCs in K is O ( t + | S | ) , where t denotes the number of transitions of K . The quotient space of K under L d i v can be computed in time O ( ( | S | + t ) + | S | ( | A P | + t ) ) under the assumption that t | S | . Thus, the costs of verifying BOD are dominated by the costs of finding the SCCs and computing the quotient space under L d i v , which are both polynomial-time.

4.2.4. Implementation and Case Study

We have implemented the proposed approach upon the PRISM model checker [31]. PRISM is a tool for modeling and analyzing concurrent and probabilistic systems [31]. It includes a language, called the PRISM language, which is a state-based language for specifying systems and programs. The PRISM tool uses binary decision diagrams to build a state model of a PRISM program and store states and transitions of the model. A PRISM program can contain a set of modules which run in parallel. The overall model of the program contains all possible transitions and interleavings of the modules. A PRISM program can also contain global variables, which can be accessed and modified by all modules of the program.
We use PRISM modules to represent threads of a multi-threaded program. Global variables represent the shared memory of the multi-threaded program. Then, the state model (Kripke structure) is built as the parallel composition of the modules containing all possible interleavings. We changed parser of PRISM and added two reserved keywords observable and secret to indicate public (observable) and secret variables.
For evaluation, we take a case study (described below) and specify it in the PRISM language. We run PRISM to build the Kripke structure of the program. We extract the set of reachable states and create a sparse matrix containing the transitions. We then traverse the Kripke, take an arbitrary path for each initial state cluster and add the path to the Kripke with new state numbers. The divergence weak low-bisimulation quotient of the new model is computed and BOD is checked.
As a case study, consider the following program, which is borrowed from [23,32]. The program—which we call the SmithVolpano program—consists of three threads.
 Thread α:
     while mask != 0 do
          while trigger0 = 0 do; /* busy waiting */
          result := result | mask ; /* bitwiseor’ */
          trigger0 := 0;
          maintrigger := maintrigger + 1;
          if maintrigger = 1 then trigger1 := 1
		   
 Thread β:
     while mask != 0 do
          while trigger1 = 0 do; /* busy waiting */
          result := result & ~ mask ; /* bitwise ‘and’ with the complement of mask */
          trigger1 := 0;
          maintrigger := maintrigger + 1;
          if maintrigger = 1 then trigger0 := 1
		   
 Thread γ:
     while mask != 0 do
          maintrigger := 0;
          if (PIN & mask ) = 0 then trigger0 := 1
                     else trigger1 := 1;
          while maintrigger != 2 do; /* busy waiting */
          mask  := mask / 2;
	  trigger0 := 1;
          trigger1 := 1
Assume that PIN is a secret variable and result is a public variable. If the scheduling of the threads is fair, that is, each thread gets its turn infinitely often and the program starts in an initial state where maintrigger=0, trigger0=0, trigger1=0 and result=0, the program leaks some bits of PIN into result. If PIN is n bits long and the initial value of mask is equal to 2 k ( k < n ), then SmithVolpano leaks k + 1 bits of PIN into result.
The PRISM description for the SmithVolpano program is given in Appendix A. It is composed of three modules Alpha, Beta and Gamma, where each module models a thread. For the sake of brevity, we only allow modules to change turn when they are in the busy waiting state. The global variables result, mask, pin, trigger0, trigger1, maintrigger and turn encode the shared variables (memory) of the program. States of the model are represented by the values of its variables, that is, (result, mask, pin, trigger0, trigger1, maintrigger, turn, c1, c2, c3).
For n = 2 , the Kripke structure of the SmithVolpano program has 228 states and 236 transitions. It contains 4 initial states, in which result (the public variable) is 0 and PIN (the secret variable) varies between 0 and 3. Thus, there is one initial state cluster and a path, containing 46 states, is extracted and added to the Kripke structure. Then, the quotient is computed. It contains 16 blocks. Since the initial state of the extracted path and all initial states of the Kripke do not belong to the same block, then the approach labels the program as BOD-insecure.
Each increase in n (i.e., the bit size of PIN) doubles the number of states and transitions of the Kripke structure. However, in all cases the computed quotient contains 16 blocks and the program is labeled as BOD-insecure.
Since the approach uses binary decision diagrams to construct the Kripke model and a sparse matrix is utilized to access the Kripke’s transitions, it computes the quotient and verifies BOD in seconds.
To our knowledge, no other evaluations of BOD have been published and we cannot perform a quantitative comparison of our implementation to other algorithms. However, we compare our approach to a closely related work that has been done by Ngo [32]. Ngo discusses the SmithVolpano program as a case study for his work on observational determinism. He formalizes observational determinism by stutter equivalence on traces of each public variable and also traces of all public variables together. Then, he presents two algorithmic verification methods for checking observational determinism. He has implemented his methods on the LTSmin-check tool [33]. As a case study, he specifies the SmithVolpano program in the PRISM language and uses the PRISM tool to export its state machine into three text files. His method then reads the state machine from the text files and uses the LTSmin-check tool to verify observational determinism. The verification algorithms have exponential time complexity, while our algorithm is polynomial. Furthermore, Ngo’s method reads the input model from three text files, while our method builds the model on-the-fly using binary decision diagrams. This makes the time complexity of our method far faster than Ngo’s methods.

5. Conclusions and Future Work

Aiming at a widely-applicable scheduler-independent analysis for secure information flow, a bisimulation-based foundation was proposed in terms of the semantics of state transition systems. Concretely, BOD was formalized to specify secure information flow by requiring indistinguishability of executions of the program. Indistinguishability was characterized in terms of divergence weak low-bisimulation between paths of the transition system of the program. Then, a model checking algorithm was proposed to verify BOD. The algorithm constructs an abstraction of the input model and then checks BOD on it. We proved the correctness of the algorithm and discussed its time complexity. Finally, the implementation and a case study was discussed. We showed how the proposed approach can be used to model and analyze secure information flow of multi-threaded programs.
As future work, we plan to develop a compositional analysis for multi-threaded programs, as compositionality can be important in making the analysis scale. We believe thread-modular verification [34] is one good candidate for such an analysis. One can also use temporal logics, such as HyperLTL [26], to logically specify BOD and then use model checking methods and tools to check BOD.

Author Contributions

Supervision, J.K. and A.I.; Writing, review and editing, A.A.N.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The PRISM description for the SmithVolpano program in the case where the initial value of mask equals to 2 is given below.
dtmc
 
const int n = 3; // num of bits of the pin variable
 
global result : [0.. pow (2, n) -1];
global mask : [0.. pow (2, n) -1];
global pin : [0.. pow (2, n) -1];
global trigger0 : [0..1];
global trigger1 : [0..1];
global maintrigger : [0..2];
global turn : [1..3];
 
module Alpha
  c1 : [0..5];
  [] turn =1 & c1 =0 & mask !=0 -> (c1 ’=1);
  [] turn =1 & c1 =1 & trigger0 =0 & trigger1 =1 -> (turn ’=2);
  [] turn =1 & c1 =1 & trigger0 =0 & trigger1 !=1 -> (turn ’=3);
  [] turn =1 & c1 =1 & trigger0 !=0 -> (c1 ’=2);
  [] turn =1 & c1 =2 & mod( floor ( result / mask ) ,2)=0 & result +mask <= pow (2,n)-1 ->
                                ( result ’= result + mask ) & (c1 ’=3);
  [] turn =1 & c1 =2 & mod( floor ( result / mask ) ,2)=1 -> (c1 ’=3);
  [] turn =1 & c1 =3 -> ( trigger0 ’=0) & (c1 ’=4);
  [] turn =1 & c1 =4 & maintrigger <2 -> ( maintrigger ’= maintrigger +1) & (c1 ’=5);
  [] turn =1 & c1 =5 & maintrigger =1 -> ( trigger1 ’=1) & (c1 ’=0);
  [] turn =1 & c1 =5 & maintrigger !=1 -> (c1 ’=0);
endmodule
 
module Beta
  c2 : [0..5];
  [] turn =2 & c2 =0 & mask !=0 -> (c2 ’=1);
  [] turn =2 & c2 =1 & trigger1 =0 & trigger0 =1 -> (turn ’=1);
  [] turn =2 & c2 =1 & trigger1 =0 & trigger0 !=1 -> (turn ’=3);
  [] turn =2 & c2 =1 & trigger1 !=0 -> (c2 ’=2);
  [] turn =2 & c2 =2 & mod( floor ( result / mask ) ,2)=1 -> (result ’= result - mask ) & (c2 ’=3);
  [] turn =2 & c2 =2 & mod( floor ( result / mask ) ,2)=0 -> (c2 ’=3);
  [] turn =2 & c2 =3 -> ( trigger1 ’=0) & (c2 ’=4);
  [] turn =2 & c2 =4 & maintrigger <2 -> ( maintrigger ’= maintrigger +1) & (c2 ’=5);
  [] turn =2 & c2 =5 & maintrigger =1 -> ( trigger0 ’=1) & (c2 ’=0);
  [] turn =2 & c2 =5 & maintrigger !=1 -> (c2 ’=0);
endmodule
 
module Gamma
  c3 : [0..6];
  [] turn =3 & mask !=0 & c3 =0 -> (c3 ’=1);
  [] turn =3 & mask =0 & c3 =0 -> (c3 ’=5);
  [] turn =3 & c3 =1 -> ( maintrigger ’=0) & (c3 ’=2);
  [] turn =3 & c3 =2 & mod( floor ( pin / mask ) ,2)=0 -> ( trigger0 ’=1) & (c3 ’=3);
  [] turn =3 & c3 =2 & mod( floor ( pin / mask ) ,2)=1 -> ( trigger1 ’=1) & (c3 ’=3);
  [] turn =3 & c3 =3 & maintrigger =2 -> (c3 ’=4);
  [] turn =3 & c3 =3 & maintrigger !=2 -> 0.5:( turn ’=1) + 0.5:( turn ’=2);
  [] turn =3 & c3 =4 -> (mask ’= floor ( mask /2)) & (c3 ’=0);
  [] turn =3 & c3 =5 -> ( trigger0 ’=1) & (c3 ’=6);
  [] turn =3 & c3 =6 -> ( trigger1 ’=1) ;
endmodule
 
init
  mask =2 & result =0 & maintrigger =0 & trigger0 =0 & trigger1 =0 & c1 =0 & c2 =0 & c3 =0 & turn =3
endinit

References

  1. Mastroeni, I.; Pasqua, M. Statically Analyzing Information Flows: An Abstract Interpretation-based Hyperanalysis for Non-interference. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC ’19, Limassol, Cyprus, 8–12 April 2019; pp. 2215–2223. [Google Scholar] [CrossRef]
  2. Smith, G. Principles of secure information flow analysis. In Malware Detection; Springer: Berlin/Heidelberg, Germany, 2007; pp. 291–307. [Google Scholar]
  3. Sabelfeld, A.; Myers, A.C. Language-based information-flow security. IEEE J. Sel. Areas Commun. 2003, 21, 5–19. [Google Scholar] [CrossRef] [Green Version]
  4. McLean, J. Proving noninterference and functional correctness using traces. J. Comput. Secur. 1992, 1, 37–57. [Google Scholar] [CrossRef]
  5. Roscoe, A.W. CSP and determinism in security modelling. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 8–10 May 1995; pp. 114–127. [Google Scholar]
  6. Zdancewic, S.; Myers, A.C. Observational determinism for concurrent program security. In Proceedings of the 16th IEEE Computer Security Foundations Workshop, CSFW’03, Pacific Grove, CA, USA, 30 June–2 July 2003; pp. 29–43. [Google Scholar]
  7. Huisman, M.; Worah, P.; Sunesen, K. A temporal logic characterisation of observational determinism. In Proceedings of the 19th IEEE workshop on Computer Security Foundations, CSFW’06, Venice, Italy, 5–7 July 2006. [Google Scholar]
  8. Terauchi, T. A type system for observational determinism. In Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF’08, Pittsburgh, PA, USA, 23–25 June 2008; pp. 287–300. [Google Scholar]
  9. Huisman, M.; Blondeel, H.C. Model-checking secure information flow for multi-threaded programs. In Proceedings of the Joint Workshop on Theory of Security and Applications, TOSCA’11, Saarbrücken, Germany, 31 March–1 April 2011; Springer: Berlin/Heidelberg, Germany, 2012; pp. 148–165. [Google Scholar]
  10. Ngo, T.M.; Stoelinga, M.; Huisman, M. Effective verification of confidentiality for multi-threaded programs. J. Comput. Secur. 2014, 22, 269–300. [Google Scholar] [CrossRef] [Green Version]
  11. Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G. Low-deterministic security for low-nondeterministic programs. J. Comput. Secur. 2018, 1–32. [Google Scholar]
  12. Datta, A.; Franklin, J.; Garg, D.; Jia, L.; Kaynar, D. On Adversary Models and Compositional Security. IEEE Secur. Priv. 2011, 9, 26–32. [Google Scholar] [CrossRef]
  13. Sabelfeld, A.; Sands, D. Probabilistic noninterference for multi-threaded programs. In Proceedings of the 13th IEEE Workshop on Computer Security Foundations, CSFW’00, Cambridge, UK, 3–5 July 2000; pp. 200–214. [Google Scholar]
  14. Balliu, M. Logics for Information Flow Security: From Specification to Verification. Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2014. [Google Scholar]
  15. Russo, A.; Hughes, J.; Naumann, D.; Sabelfeld, A. Closing internal timing channels by transformation. In Proceedings of the Annual Asian Computing Science Conference, Doha, Qatar, 9–11 December 2006; pp. 120–135. [Google Scholar]
  16. Mantel, H.; Sudbrock, H. Flexible scheduler-independent security. In Proceedings of the 15th European Conference on Research in Computer Security, ESORICS’10, Athens, Greece, 20–22 September 2010; pp. 116–133. [Google Scholar]
  17. Boudol, G.; Castellani, I. Noninterference for concurrent programs and thread systems. Theor. Comput. Sci. 2002, 281, 109–130. [Google Scholar] [CrossRef] [Green Version]
  18. Smith, G. Probabilistic noninterference through weak probabilistic bisimulation. In Proceedings of the 16th IEEE Workshop on Computer Security Foundations, CSFW’03, Pacific Grove, CA, USA, 30 June–2 July 2003; pp. 3–13. [Google Scholar]
  19. Baier, C.; Katoen, J.P. Principles of Model Checking; MIT Press: Cambridge, MA, USA, 2008. [Google Scholar]
  20. Dabaghchian, M.; Abdollahi Azgomi, M. Model checking the observational determinism security property using PROMELA and SPIN. Form. Asp. Comput. 2015, 27, 789–804. [Google Scholar] [CrossRef]
  21. Giffhorn, D.; Snelting, G. A new algorithm for low-deterministic security. Int. J. Inf. Secur. 2015, 14, 263–287. [Google Scholar] [CrossRef]
  22. Volpano, D.; Irvine, C.; Smith, G. A sound type system for secure flow analysis. J. Comput. Secur. 1996, 4, 167–187. [Google Scholar] [CrossRef] [Green Version]
  23. Smith, G.; Volpano, D. Secure information flow in a multi-threaded imperative language. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL’98, San Diego, CA, USA, 19–21 January 1998; pp. 355–364. [Google Scholar]
  24. Volpano, D.; Smith, G. Probabilistic noninterference in a concurrent language. J. Comput. Secur. 1999, 7, 231–253. [Google Scholar] [CrossRef]
  25. Barthe, G.; D’Argenio, P.R.; Rezk, T. Secure information flow by self-composition. In Proceedings of the 17th IEEE Workshop on Computer Security Foundations, CSFW’04, Washington, DC, USA, 28–30 June 2004; pp. 100–114. [Google Scholar]
  26. Clarkson, M.R.; Finkbeiner, B.; Koleini, M.; Micinski, K.K.; Rabe, M.N.; Sánchez, C. Temporal logics for hyperproperties. In Proceedings of the Third International Conference on Principles of Security and Trust, POST’14, Grenoble, France, 5–13 April 2014; pp. 265–284. [Google Scholar]
  27. Pnueli, A. The temporal logic of programs. In Proceedings of the 18th Annual Symposium on Foundations of Computer Science (SFCS 1977), Providence, RI, USA, 30 September–31 October 1977; pp. 46–57. [Google Scholar] [CrossRef]
  28. Finkbeiner, B.; Hahn, C.; Stenger, M.; Tentrup, L. Monitoring Hyperproperties. In Runtime Verification; Lahiri, S., Reger, G., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 190–207. [Google Scholar] [Green Version]
  29. Hahn, C.; Stenger, M.; Tentrup, L. Constraint-Based Monitoring of Hyperproperties. In Tools and Algorithms for the Construction and Analysis of Systems; Vojnar, T., Zhang, L., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 115–131. [Google Scholar] [Green Version]
  30. Groote, J.F.; Vaandrager, F. An efficient algorithm for branching bisimulation and stuttering equivalence. In Proceedings of the 17th International Colloquium on Automata, Languages and Programming, Coventry, UK, 16–20 July 1990; pp. 626–638. [Google Scholar]
  31. Kwiatkowska, M.; Norman, G.; Parker, D. PRISM 4.0: Verification of Probabilistic Real-time Systems. In Proceedings of the 23rd International Conference on Computer Aided Verification, CAV’11, Snowbird, UT, USA, 14–20 July 2011; Gopalakrishnan, G., Qadeer, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6806, pp. 585–591. [Google Scholar]
  32. Ngo, T.M. Qualitative and Quantitative Information Flow Analysis for Multi-Thread Programs. Ph.D Thesis, University of Twente, Enschede, The Netherlands, 2014. [Google Scholar]
  33. Blom, S.; van de Pol, J.; Weber, M. LTSmin: Distributed and Symbolic Reachability. In Computer Aided Verification; Touili, T., Cook, B., Jackson, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 354–359. [Google Scholar] [Green Version]
  34. Flanagan, C.; Freund, S.N.; Qadeer, S. Thread-modular verification for shared-memory programs. In Proceedings of the 11th European Symposium on Programming Languages and Systems, ESOP’02, Grenoble, France, 8–12 April 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 262–277. [Google Scholar]
Figure 1. Kripke structure of the program P1.
Figure 1. Kripke structure of the program P1.
Mca 24 00064 g001
Figure 2. Kripke structure of the program P2.
Figure 2. Kripke structure of the program P2.
Mca 24 00064 g002
Figure 3. Kripke structure of the program P4.
Figure 3. Kripke structure of the program P4.
Mca 24 00064 g003
Figure 4. Kripke structure of the program P5.
Figure 4. Kripke structure of the program P5.
Mca 24 00064 g004
Figure 5. Kripke structure of the program P6.
Figure 5. Kripke structure of the program P6.
Mca 24 00064 g005

Share and Cite

MDPI and ACS Style

Noroozi, A.A.; Karimpour, J.; Isazadeh, A. Bisimulation for Secure Information Flow Analysis of Multi-Threaded Programs. Math. Comput. Appl. 2019, 24, 64. https://doi.org/10.3390/mca24020064

AMA Style

Noroozi AA, Karimpour J, Isazadeh A. Bisimulation for Secure Information Flow Analysis of Multi-Threaded Programs. Mathematical and Computational Applications. 2019; 24(2):64. https://doi.org/10.3390/mca24020064

Chicago/Turabian Style

Noroozi, Ali A., Jaber Karimpour, and Ayaz Isazadeh. 2019. "Bisimulation for Secure Information Flow Analysis of Multi-Threaded Programs" Mathematical and Computational Applications 24, no. 2: 64. https://doi.org/10.3390/mca24020064

Article Metrics

Back to TopTop