Abstract. This paper shows how secure information flow properties of multi-threaded programs can be verified by model checking in a precise and efficient way, by using the idea of self-composition. It discusses two properties that aim to capture secure information flow for multi-threaded programs, and it shows how these properties can be char-acterised in modal µ-calculus. For this characterisation, a self-composed model of the program is constructed. More precisely, this is a model that contains two copies of the labelled transition system induced by the program, so that the program is executed in parallel with itself. The self-composed model allows to compare two program executions in a single temporal formula that characterises a secure ...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Given its pervasiveness, it is unfortunate that writing multi-threaded software is an in-tricate and...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Information flow policies are confidentiality policies that control information leakage through prog...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We propose an approach on model checking information flow for imperative language with procedures. W...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Given its pervasiveness, it is unfortunate that writing multi-threaded software is an in-tricate and...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Information flow policies are confidentiality policies that control information leakage through prog...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We propose an approach on model checking information flow for imperative language with procedures. W...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Given its pervasiveness, it is unfortunate that writing multi-threaded software is an in-tricate and...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...