Abstract. Information-flow control (IFC) is a security mechanism conceived to allow untrusted code to manipulate sensitive data without compromising confidentiality. Unfortunately, untrusted code might exploit some covert channels in order to reveal information. In this paper, we focus on the LIO concurrent IFC system. By leveraging the effects of hardware caches (e.g., the CPU cache), LIO is susceptible to attacks that leak information through the internal timing covert channel. We present a resumption-based approach to address such attacks. Resumptions provide fine-grained control over the interleaving of thread computations at the library level. Specifically, we remove cache-based attacks by enforcing that every thread yield after execut...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
The problem of controlling information flow in multithreaded programs remains an important open chal...
Abstract. Information-flow control (IFC) is a security mechanism con-ceived to allow untrusted code ...
Information-flow control (IFC) allows untrusted code to manipulate sensitive data while preserving c...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
We present the foundations for a new dynamic information flow control (IFC) parallel runtime system,...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
The work presented in this thesis focuses on information-flow control systems for functional program...
Information flow control allows untrusted code to access sensitive andtrustworthy information without...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
The problem of controlling information flow in multithreaded programs remains an important open cha...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
The problem of controlling information flow in multithreaded programs remains an important open chal...
Abstract. Information-flow control (IFC) is a security mechanism con-ceived to allow untrusted code ...
Information-flow control (IFC) allows untrusted code to manipulate sensitive data while preserving c...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
We present the foundations for a new dynamic information flow control (IFC) parallel runtime system,...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
The work presented in this thesis focuses on information-flow control systems for functional program...
Information flow control allows untrusted code to access sensitive andtrustworthy information without...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
Weak memory models implemented on modern multicore processors are known to affect the correctness of...
The problem of controlling information flow in multithreaded programs remains an important open cha...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
The problem of controlling information flow in multithreaded programs remains an important open chal...