Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world by accident or malice. Protecting the access to information is not enough to solve this problem. We have to ensure that the program uses the information in a secure way.Work on information flow security often ignores information flows through covert channels even though they pose a serious threat. In the first paper we present a framework for timing-aware information-flow type systems for a low-level language similar to a non-trivial subset of a sequential Java bytecode. The framework is parametrised over a time model of the instructions of the language and over the algorith...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
<p>Common protection mechanisms fail to provide end-to-end security; programs with legitimate access...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We consider a sequential object-oriented language with pointers and mutable state, private fields an...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
This paper specifies a nontermination-insensitive, interprocedural, information flow analysis for ob...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
<p>Common protection mechanisms fail to provide end-to-end security; programs with legitimate access...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We consider a sequential object-oriented language with pointers and mutable state, private fields an...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
This paper specifies a nontermination-insensitive, interprocedural, information flow analysis for ob...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...