Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information, and a dynamic approach can mak
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
A static program analysis called information flow analysis has been studied for high-level programm...
We give a formal definition of the notion of information flow for a simple guarded command language....
When giving a program access to secret information, one must ensure that the program does not le...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Abstract. When giving a program access to secret information, one must ensure that the program does ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
International audienceNoninterference, which is an information flow property, is typically used as a...
Information flow analysis is concerned with validating the security of information flows between obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
A static program analysis called information flow analysis has been studied for high-level programm...
We give a formal definition of the notion of information flow for a simple guarded command language....
When giving a program access to secret information, one must ensure that the program does not le...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Abstract. When giving a program access to secret information, one must ensure that the program does ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
International audienceNoninterference, which is an information flow property, is typically used as a...
Information flow analysis is concerned with validating the security of information flows between obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
A static program analysis called information flow analysis has been studied for high-level programm...