Recently, much progress has been made on achieving information-flow security via secure multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by executing a given program multiple times, once for each security level, while carefully dispatching inputs and ensuring that an execution at a given level is responsible for producing outputs for information sinks at that level. Secure multi-execution guarantees noninterference, in the sense of no dependencies from secret inputs to public outputs, and transparency, in the sense that if a program is secure then its secure multi-execution does not destroy its original behavior. This paper pushes the boundary of what can be achieved with secure multi-execution. First, we ...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Recently, much progress has been made on achieving information-flow security via secure multi-execut...
In the past years, researchers have been focusingon applying information flow security to web applic...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
Abstract—In the past years, researchers have been focusing on applying information flow security to ...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
Publication rights licensed to ACM. To enforce non-interference, both Secure Multi-Execution (SME) a...
Abstract. Language-based information-flow security has emerged as a promis-ing technology to guarant...
This paper explores information-flow control for batch-job programs that are allowed to be re-run wi...
Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell...
Information Flow Control (IFC) is a collection of techniques for ensuring a no-write-down no-read-up...
International audienceSecure multi-execution (SME) is a dynamic technique to ensure secure informati...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Recently, much progress has been made on achieving information-flow security via secure multi-execut...
In the past years, researchers have been focusingon applying information flow security to web applic...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
Abstract—In the past years, researchers have been focusing on applying information flow security to ...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
Publication rights licensed to ACM. To enforce non-interference, both Secure Multi-Execution (SME) a...
Abstract. Language-based information-flow security has emerged as a promis-ing technology to guarant...
This paper explores information-flow control for batch-job programs that are allowed to be re-run wi...
Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell...
Information Flow Control (IFC) is a collection of techniques for ensuring a no-write-down no-read-up...
International audienceSecure multi-execution (SME) is a dynamic technique to ensure secure informati...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...