Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in the information flow literature. However, application of non-interference to software systems has been limited in practice. This is partly due to the imprecision that is inherent in static analyses that have formed the basis of previous non-interference based techniques. Runtime approaches can be significantly more accurate than static analysis, and have been more successful in practical systems that reason about information flow. However, these techniques only reason about explicit information flows that take place via assignments in a program. Implicit flows that take place without involving assignments, and can be inferred from the struct...
This thesis improves the current state of the art on information-flow control of interactive and obj...
Information flow control (IFC) has been extensively studied as an approach to mitigate information l...
This thesis improves the current state of the art on information-flow control of interactive and obj...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In the context of systems security, information flows play a central role. Unhandled information flo...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Standard access control mechanisms are often insufficient to enforce compliance of programs with sec...
We address the problem of characterising the security of a program against unauthorised information ...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
We address the problem of characterising the security of a program against unauthorised information ...
This thesis improves the current state of the art on information-flow control of interactive and obj...
Information flow control (IFC) has been extensively studied as an approach to mitigate information l...
This thesis improves the current state of the art on information-flow control of interactive and obj...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In the context of systems security, information flows play a central role. Unhandled information flo...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Standard access control mechanisms are often insufficient to enforce compliance of programs with sec...
We address the problem of characterising the security of a program against unauthorised information ...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
We address the problem of characterising the security of a program against unauthorised information ...
This thesis improves the current state of the art on information-flow control of interactive and obj...
Information flow control (IFC) has been extensively studied as an approach to mitigate information l...
This thesis improves the current state of the art on information-flow control of interactive and obj...