With the ever increase in the demand of building secure systems, recent years are witnessing a plethora of research on information flow control (IFC) techniques in programming languages to enforce a finer-grained restriction on the propagation of information among untrusted objects. In this paper, we introduce a dynamic labelling (DL) algorithm (This paper is an extended version of the article [1] presented in SECRYPT’18.) for security certification of imperative programming languages that follows a combination of mutable and immutable labelling referred to as hybrid labelling approach. First, we study the possible methods of binding security labels with the subjects and objects of the program which include program counter that represent im...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis investigates the specification and the application of dynamic security policies in infor...
This paper explores information flow control in systems in which the security classes of data can v...
This paper explores information flow control in systems in which the security classes of data can va...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
The programming language Haskell plays a unique, privileged role in Information-Flow Control (IFC) r...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
Information Flow Control (IFC) is a method of enforcing confidentiality by using labels, data struct...
We give a formal definition of the notion of information flow for a simple guarded command language....
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis investigates the specification and the application of dynamic security policies in infor...
This paper explores information flow control in systems in which the security classes of data can v...
This paper explores information flow control in systems in which the security classes of data can va...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
The programming language Haskell plays a unique, privileged role in Information-Flow Control (IFC) r...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
Information Flow Control (IFC) is a method of enforcing confidentiality by using labels, data struct...
We give a formal definition of the notion of information flow for a simple guarded command language....
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis investigates the specification and the application of dynamic security policies in infor...