This paper studies the foundations of information-flow security for interactive programs. Previous research assumes that the environment is total, that is, it must always be ready to feed new inputs into programs. However, programs secure under this assumption can leak the presence of input. Such leaks can be magnified to whole-secret leaks in the concurrent setting. We propose a framework that generalizes previous research along two dimensions: first, the framework breaks away from the totality of the environment and, second, the framework features fine-grained security types for communication channels, where we distinguish between the security level of message presence and message content. We show that the generalized framework features a...
Information flow policies are confidentiality policies that control information leakage through prog...
Interactive/Reactive computational model is known to be proper abstraction of many pervasively used ...
This thesis improves the current state of the art on information-flow control of interactive and obj...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
We present a general unwinding framework for the definition of information flow security properties ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Research in information-flow security aims at developing methods to identify undesired information l...
Software pervades our society deeper with every year. This trend makes software security more and mo...
If we classify variables in a program into various security levels, then a secure information flow a...
Research in information-flow security aims at developing methods to identify undesired information l...
International audienceOne of the concerns in the use of computer systems is to avoid the leakage of ...
Information flow policies are confidentiality policies that control information leakage through prog...
Interactive/Reactive computational model is known to be proper abstraction of many pervasively used ...
This thesis improves the current state of the art on information-flow control of interactive and obj...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
We present a general unwinding framework for the definition of information flow security properties ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Research in information-flow security aims at developing methods to identify undesired information l...
Software pervades our society deeper with every year. This trend makes software security more and mo...
If we classify variables in a program into various security levels, then a secure information flow a...
Research in information-flow security aims at developing methods to identify undesired information l...
International audienceOne of the concerns in the use of computer systems is to avoid the leakage of ...
Information flow policies are confidentiality policies that control information leakage through prog...
Interactive/Reactive computational model is known to be proper abstraction of many pervasively used ...
This thesis improves the current state of the art on information-flow control of interactive and obj...