This paper describes the design, analysis, and implementation of an efficient algorithm for information flow analysis expressed us-ing a type system. Given a program and an environment of secu-rity classes for information accessed by the program, the algorithm checks whether the program is well typed, i.e., there is no informa-tion of higher security classes flowing into places of lower security classes according to a lattice of security classes, by inferring the highest or lowest security class as appropriate for each program node. We express the analysis as a set of Datalog-like rules based on the typing and subtyping rules, and we use a systematic method to generate specialized algorithms and data structures directly from the Datalog-lik...
International audienceSecure information flow analysis aims to check that the execution of a program...
We present a bottom-up algorithm which, given an untyped process P , calculates the minimal set of c...
We consider a type discipline for the Ambient Calculus that associates ambients with security levels...
If we classify variables in a program into various security levels, then a secure information flow a...
Type-based information-flow analyses provide strong end-to-end confidentiality guarantees for progra...
A static program analysis called information flow analysis has been studied for high-level programm...
This article investigates formal properties of a family of semantically sound flow-sensitive type sy...
Type systems for secure information flow are useful for efficiently checking that programs have secu...
AbstractWe show that a large class of data-flow analyses for imperative languages are describable as...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Information systems are widespread and used by anyone with computing devices as well as corporation...
Abstract Type-based and PDG-based information flow analysis tech-niques are currently developed inde...
Run-time type analysis allows programmers to easily and concisely define operations based upon type ...
International audienceSecure information flow analysis aims to check that the execution of a program...
We present a bottom-up algorithm which, given an untyped process P , calculates the minimal set of c...
We consider a type discipline for the Ambient Calculus that associates ambients with security levels...
If we classify variables in a program into various security levels, then a secure information flow a...
Type-based information-flow analyses provide strong end-to-end confidentiality guarantees for progra...
A static program analysis called information flow analysis has been studied for high-level programm...
This article investigates formal properties of a family of semantically sound flow-sensitive type sy...
Type systems for secure information flow are useful for efficiently checking that programs have secu...
AbstractWe show that a large class of data-flow analyses for imperative languages are describable as...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Information systems are widespread and used by anyone with computing devices as well as corporation...
Abstract Type-based and PDG-based information flow analysis tech-niques are currently developed inde...
Run-time type analysis allows programmers to easily and concisely define operations based upon type ...
International audienceSecure information flow analysis aims to check that the execution of a program...
We present a bottom-up algorithm which, given an untyped process P , calculates the minimal set of c...
We consider a type discipline for the Ambient Calculus that associates ambients with security levels...