Controlling confidential information in concurrent systems is difficult, due to covert channels resulting from interaction between threads. This problem is exacerbated if threads share resources at fine granularity. In this work, we propose a novel monitoring framework to enforce strong information security in concurrent programs. Our monitors are hybrid, combining dynamic and static program analysis to enforce security in a sound and rather precise fashion. In our framework, each thread is guarded by its own local monitor, and there is a single global monitor. We instantiate our monitoring framework to support rely-guarantee style reasoning about the use of shared resources, at the granularity of individual memory locations, and then speci...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
International audienceEnforcement of noninterference requires proving that an attacker's knowledge a...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Abstract. We present a general unwinding framework for the definition of information flow security p...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
International audienceEnforcement of noninterference requires proving that an attacker's knowledge a...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Abstract. We present a general unwinding framework for the definition of information flow security p...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
International audienceEnforcement of noninterference requires proving that an attacker's knowledge a...