HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

A taint marking approach to confidentiality violation detection

Abstract : This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Document type :
Conference papers
Complete list of metadata

Contributor : Myriam Andrieux Connect in order to contact the contributor
Submitted on : Thursday, September 27, 2012 - 2:52:18 PM
Last modification on : Wednesday, February 2, 2022 - 3:50:41 PM


  • HAL Id : hal-00736045, version 1


Christophe Hauser, Frédéric Tronel, Jason Reid, Colin Fidge. A taint marking approach to confidentiality violation detection. AISC 2012, Jan 2012, Melbourne, Australia. pp.83-90. ⟨hal-00736045⟩



Record views