Controlling confidential information in concurrent systems is difficult, due to covert channels resulting from interaction between threads. This problem is exacerbated if threads share resources at fine granularity. In this work, we propose a novel monitoring framework to enforce strong information security in concurrent programs. Our monitors are hybrid, combining dynamic and static program analysis to enforce security in a sound and rather precise fashion. In our framework, each thread is guarded by its own local monitor, and there is a single global monitor. We instantiate our monitoring framework to support rely-guarantee style reasoning about the use of shared resources, at the granularity of individual memory locations, and then speci...
Research in information-flow security aims at developing methods to identify undesired information l...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
We present a novel progress-sensitive, flow-sensitive hybrid information-flow control monitor for an...
Hybrid information-flow monitors use a combination of static analysis and dynamic mechanisms to prov...
We demonstrate that a practical concurrent language can be extended in a natural way with informatio...
Here, I pose the thesis that proving noninterference and its preservation by a compiler is feasible ...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Part 9: Software SecurityInternational audienceWe present a novel progress-sensitive, flow-sensitive...
Research in information-flow security aims at developing methods to identify undesired information l...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
We present a novel progress-sensitive, flow-sensitive hybrid information-flow control monitor for an...
Hybrid information-flow monitors use a combination of static analysis and dynamic mechanisms to prov...
We demonstrate that a practical concurrent language can be extended in a natural way with informatio...
Here, I pose the thesis that proving noninterference and its preservation by a compiler is feasible ...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Part 9: Software SecurityInternational audienceWe present a novel progress-sensitive, flow-sensitive...
Research in information-flow security aims at developing methods to identify undesired information l...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...