Abstract — In classic information flow control (IFC), noninterference guarantees that no information flows from secret input channels to public output channels. However, this notion turned out to be overly restrictive as many intuitively secure programs do allow some release. In this paper we define a static analysis that allows intransitive noninterference in combination with contextsensitive analysis for Java bytecode programs. In contrast to type systems that annotate variables, our approach annotates information sources and sinks. To the best of our knowledge this is the first IFC technique which is flow-, context-, and objectsensitive. It allows IFC for realistic languages like Java or C and offers a mechanism for declassification to a...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
Information flow control (IFC) is a technique to assert the security of a given program with respect...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
We present the first machine-checked correctness proof for information flow control (IFC) based on p...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
Abstract. Early work in implicit information flow detection applied only to flat, procedureless lang...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
This thesis improves the current state of the art on information-flow control of interactive and obj...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
A semantic-based approach is commonly considered more precise than the type-based approach to enforc...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
Information flow control (IFC) is a technique to assert the security of a given program with respect...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
We present the first machine-checked correctness proof for information flow control (IFC) based on p...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
Abstract. Early work in implicit information flow detection applied only to flat, procedureless lang...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
This thesis improves the current state of the art on information-flow control of interactive and obj...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
A semantic-based approach is commonly considered more precise than the type-based approach to enforc...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...