Abstract—Research on information flow security for concur-rent programs usually assumes sequential consistency although modern multi-core processors often support weaker consistency guarantees. In this article, we clarify the impact that relaxations of sequential consistency have on information flow security. We consider four memory models and prove for each of them that information flow security under this model does not imply information flow security in any of the other models. This result suggests that research on security needs to pay more attention to the consistency guarantees provided by contemporary hardware. The other main technical contribution of this article is a program transformation that soundly enforces information flow sec...
Developing correct and performant concurrent systems is a major challenge. When programming an appli...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
Sequential Consistency (SC) is the memory model traditionally applied by programmers and verificatio...
Software pervades our society deeper with every year. This trend makes software security more and mo...
Thesis (Sc. D.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2001.Includ...
During the last few years many different memory consistency protocols have been proposed. These rang...
We present a general unwinding framework for the definition of information flow security properties ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
For performance reasons, modern multiprocessors implement relaxed memory consistency models that adm...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Developing correct and performant concurrent systems is a major challenge. When programming an appli...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
Sequential Consistency (SC) is the memory model traditionally applied by programmers and verificatio...
Software pervades our society deeper with every year. This trend makes software security more and mo...
Thesis (Sc. D.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2001.Includ...
During the last few years many different memory consistency protocols have been proposed. These rang...
We present a general unwinding framework for the definition of information flow security properties ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
For performance reasons, modern multiprocessors implement relaxed memory consistency models that adm...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Developing correct and performant concurrent systems is a major challenge. When programming an appli...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...