Detecting information flows inside a program is useful to check non-interference or independence of program variables, an important aspect of software security. In this paper we present a new abstract domain C expressing constancy of program variables. We then apply Giacobazzi and Scozzari's linear refinement to build a domain C->C which contains all input/output dependences between the constancy of program variables. We show that C->C is optimal, in the sense that it cannot be further linearly refined, andcondensing, in the sense that a compositional, input-independent static analysis over C->C has the same precision as a non-compositional, input-driven analysis. Moreover, we show that C->C has a natural representation in terms...
Software pervades our society deeper with every year. This trend makes software security more and mo...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
AbstractDetecting information flows inside a program is useful to check non-interference or independ...
Detecting information flows inside a program is useful to check non-interference of program variable...
In the context of systems security, information flows play a central role. Unhandled information flo...
In programming language research, information-flow control (IFC) is a technique for enforcing a vari...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractWe specify an information flow analysis for a simple imperative language, using a Hoare-like...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
Information flow control (IFC) is a category of techniques for enforcing information flow properties...
AbstractWe show how information theory can be used to give a quantitative definition of interference...
The non-interference (NI) property defines a program to be secure if changes to high-security inputs...
Information flow properties are the semantic cornerstone of a wide range of program transformations,...
Software pervades our society deeper with every year. This trend makes software security more and mo...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
AbstractDetecting information flows inside a program is useful to check non-interference or independ...
Detecting information flows inside a program is useful to check non-interference of program variable...
In the context of systems security, information flows play a central role. Unhandled information flo...
In programming language research, information-flow control (IFC) is a technique for enforcing a vari...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractWe specify an information flow analysis for a simple imperative language, using a Hoare-like...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
Information flow control (IFC) is a category of techniques for enforcing information flow properties...
AbstractWe show how information theory can be used to give a quantitative definition of interference...
The non-interference (NI) property defines a program to be secure if changes to high-security inputs...
Information flow properties are the semantic cornerstone of a wide range of program transformations,...
Software pervades our society deeper with every year. This trend makes software security more and mo...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...