In this paper we describe a method for verifying secure information flow of programs, where apart from direct and indirect flows a secret information can be leaked through covert timing channels. That is, no two computations of a program that differ only on high-security inputs can be distinguished by low-security outputs and timing differences. We attack this problem by using slot-game semantics for a quantitative analysis of programs. We show how slot-games model can be used for performing a precise security analysis of programs, that takes into account both extensional and intensional properties of programs. The practicality of this approach for automated verification is also shown.
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
International audienceAfter a short introduction to the field of security protocol verification, we ...
In today's information-based society, guaranteeing information security plays an important role in a...
In this paper we describe a method for verifying secure information flow of programs, where apart fr...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
A game-theoretic approach is introduced to quantify possible information leaks in spread-spectrum da...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Abstract. Non-interference is a security property which states that im-proper information leakages d...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
International audienceAfter a short introduction to the field of security protocol verification, we ...
In today's information-based society, guaranteeing information security plays an important role in a...
In this paper we describe a method for verifying secure information flow of programs, where apart fr...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
A game-theoretic approach is introduced to quantify possible information leaks in spread-spectrum da...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Abstract. Non-interference is a security property which states that im-proper information leakages d...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
International audienceAfter a short introduction to the field of security protocol verification, we ...
In today's information-based society, guaranteeing information security plays an important role in a...