Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of non-interference, this paper considers dynamic, automaton-based, monitoring of information flow for a single execution of a sequential program. The mechanism is based on a combination of dynamic and static analyses. During program execution, abstractions of program events are sent to the automaton, which uses the abstractions to track information flows and to control the execution by forbidding or editing dangerous actions. The mechanism proposed is proved to be sound, to preserve executions of well-typed programs (in the security type system of Volpano, Smith and Irv...
Earlier work [LGBJS06] presents an automaton-based non-interference monitoring mechanism for sequent...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
Earlier work [LGBJS06] presents an automaton-based non-interference monitoring mechanism for sequent...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
Earlier work [LGBJS06] presents an automaton-based non-interference monitoring mechanism for sequent...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...