The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper presents the design and implementation of such an information flow control system, named Trishul, as a Java Virtual Machine. In particular we address the hard problem of tracing implicit information flow, which had not been resolved by previous run-time systems and the intricacies added on by the Java architecture. We argue that the security benefits offered by Trishul are substantial enough to counter-weigh the performance overhead of the system as shown by our experiments
Abstract—SilverLine is a novel, exceptionally modular frame-work for enforcing mandatory information...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract. Much progress has recently been made on information flow control, enabling the enforcement...
AbstractThe ability to enforce usage policies attached to data in a fine grained manner requires tha...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities ...
In the multiapplicative context of smart cards, a strict control of underlying information flow betw...
Conventional security policies for software applications are adequate for managing concerns on the l...
Information flow control (IFC) is a technique to assert the security of a given program with respect...
Conventional security policies for software applications are adequate for managing concerns on the l...
Decentralized Information Flow Control (DIFC) is a promising model for writing programs with powerfu...
International audienceIn the multiapplicative context of smart cards, a strict con- trol of underlyi...
Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) tec...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
Abstract—SilverLine is a novel, exceptionally modular frame-work for enforcing mandatory information...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract. Much progress has recently been made on information flow control, enabling the enforcement...
AbstractThe ability to enforce usage policies attached to data in a fine grained manner requires tha...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities ...
In the multiapplicative context of smart cards, a strict control of underlying information flow betw...
Conventional security policies for software applications are adequate for managing concerns on the l...
Information flow control (IFC) is a technique to assert the security of a given program with respect...
Conventional security policies for software applications are adequate for managing concerns on the l...
Decentralized Information Flow Control (DIFC) is a promising model for writing programs with powerfu...
International audienceIn the multiapplicative context of smart cards, a strict con- trol of underlyi...
Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) tec...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
Abstract—SilverLine is a novel, exceptionally modular frame-work for enforcing mandatory information...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Abstract. Much progress has recently been made on information flow control, enabling the enforcement...