Weak memory models implemented on modern multicore processors are known to affect the correctness of concurrent code. They can also affect whether or not it is secure. This is particularly the case in programs where the security levels of variables are value-dependent, i.e., depend on the values of other variables. In this paper, we illustrate how instruction reordering allowed by contemporary multicore processors leads to vulnerabilities in such programs, and present a compositional, timing-sensitive information-flow logic which can be used to detect such vulnerabilities. The logic allows step-local reasoning (one instruction at a time) about a thread’s security by tracking information about dependencies between instructions which guarante...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Weak memory models formalize the unexpected behavior that one can expect to observe in multi-threade...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Abstract—Research on information flow security for concur-rent programs usually assumes sequential c...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Software pervades our society deeper with every year. This trend makes software security more and mo...
In today's information-based society, guaranteeing information security plays an important role in a...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
Abstract. Information-flow control (IFC) is a security mechanism conceived to allow untrusted code t...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Weak memory models formalize the unexpected behavior that one can expect to observe in multi-threade...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Abstract—Research on information flow security for concur-rent programs usually assumes sequential c...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Software pervades our society deeper with every year. This trend makes software security more and mo...
In today's information-based society, guaranteeing information security plays an important role in a...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
Abstract. Information-flow control (IFC) is a security mechanism conceived to allow untrusted code t...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Weak memory models formalize the unexpected behavior that one can expect to observe in multi-threade...