AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they pose a serious threat. A typical covert channel is to use the timing of certain events to carry information. We present a timing-aware information-flow type system for a low-level language similar to a non-trivial subset of a sequential Java bytecode. The type system is parameterized over the time model of the instructions of the language and over the algorithm enforcing low-observatio...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract A timing attack exploits the variance in the running time of a crypto-algorithm’s implement...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
International audienceConstant-time is a programming discipline which protects security sensitive co...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
The problem of controlling information flow in multithreaded programs remains an important open chal...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Abstract A timing attack exploits the variance in the running time of a crypto-algorithm’s implement...
This thesis improves the current state of the art on information-flow control of interactive and obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract A timing attack exploits the variance in the running time of a crypto-algorithm’s implement...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
International audienceConstant-time is a programming discipline which protects security sensitive co...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
The problem of controlling information flow in multithreaded programs remains an important open chal...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Abstract A timing attack exploits the variance in the running time of a crypto-algorithm’s implement...
This thesis improves the current state of the art on information-flow control of interactive and obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract A timing attack exploits the variance in the running time of a crypto-algorithm’s implement...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...