Information-flow technology is a promising approach for ensuring securityby design and construction. When tracking information flow, of particular concernare implicit flows, i.e., flows through control flow when computation brancheson secret data and performs publicly observed side effects depending on whichbranch is taken.The large body of literature exercises two extreme views on implicit flows: eithertrack them (striving to show that there are no leaks, and often running into theproblem of complex enforcement mechanisms and false alarms), or not track them(which reduces false alarms, but provides weak or no security guarantees).This paper distinguishes between malicious and nonmalicious code. The attackermay exploit implicit flows with m...
Recent micro-architectural research has proposed various schemes to enhance processors with addition...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Information-flow technology is a promising approach for ensuring security by design and construction...
Information flow analysis prevents secret or untrusted data from flowing into public or trusted sink...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
Information flow control (IFC) has been extensively studied as an approach to mitigate information l...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
This thesis improves the current state of the art on information-flow control of interactive and obj...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Recent micro-architectural research has proposed various schemes to enhance processors with addition...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Information-flow technology is a promising approach for ensuring security by design and construction...
Information flow analysis prevents secret or untrusted data from flowing into public or trusted sink...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
Information flow control (IFC) has been extensively studied as an approach to mitigate information l...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
This thesis improves the current state of the art on information-flow control of interactive and obj...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Recent micro-architectural research has proposed various schemes to enhance processors with addition...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...