International audienceInformation flow analysis models the propagation of data through a software system and identifies unintended information leaks. There is a wide range of such analyses, tracking flows statically, dynamically, or in a hybrid way combining both static and dynamic approaches. We present a hybrid information flow analysis for a large subset of the C programming language. Extending previous work that handled a few difficult features of C, our analysis can now deal with arrays, pointers with pointer arithmetic, structures, dynamic memory allocation, complex control flow, and statically resolvable indirect function calls. The analysis is implemented as a plugin to the Frama-C framework. We demonstrate the applicability and pre...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
We present a new approach for tracking programs' use of data througharbitrary calculations, to deter...
Abstract. We present a hybrid approach to information flow security where security violations are de...
C and JavaScript are widely-used languages for writing security-sensitive software, despite their in...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
Conference of 4th International Workshop on Verification and Program Transformation, VPT 2016 ; Conf...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
We present a new approach for tracking programs' use of data througharbitrary calculations, to deter...
Abstract. We present a hybrid approach to information flow security where security violations are de...
C and JavaScript are widely-used languages for writing security-sensitive software, despite their in...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...