Refactoring preserves security

Kammueller, Florian ORCID logoORCID: (2016) Refactoring preserves security. Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. In: 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016, 26-27 Sept 2016, Heraklion, Crete, Greece. ISBN 9783319470719. ISSN 0302-9743 [Conference or Workshop Item] (doi:10.1007/978-3-319-47072-6_17)

PDF - Final accepted version (with author's formatting)
Download (368kB) | Preview


Refactoring allows changing a program without changing its behaviour from an observer’s point of view. To what extent does this invariant of behaviour also preserve security? We show that a program remains secure under refactoring. As a foundation, we use the Decentralized Label Model (DLM) for specifying secure information flows of programs and transition system models for their observable behaviour. On this basis, we provide a bisimulation based formal definition of refactoring and show its correspondence to the formal notion of information flow security (noninterference). This permits us to show security of refactoring patterns that have already been practically explored.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Paper published as chapter in: Data Privacy Management and Security Assurance, 2016, Volume 9963 of the series Lecture Notes in Computer Science pp 238-245
Research Areas: A. > School of Science and Technology > Computer Science > Foundations of Computing group
Item ID: 20406
Notes on copyright: Attached is an author accepted manuscript version of a paper published in Lecture Notes in Computer Science; made available in this repository in accordance with the publisher's self-archiving policy. The final publication is available at Springer via
Useful Links:
Depositing User: Florian Kammueller
Date Deposited: 02 Sep 2016 11:55
Last Modified: 29 Nov 2022 21:34

Actions (login required)

View Item View Item


Activity Overview
6 month trend
6 month trend

Additional statistics are available via IRStats2.