International audienceNoninterference, which is an information flow property, is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. Noninterference verification mechanisms are usually based on static analyses and, to a lesser extent, on dynamic analyses. In contrast to those works, this paper proposes an information flow testing mechanism. This mechanism is sound from the point of view of noninterference. It is based on standard testing techniques and on a combination of dynamic and static analyses. Concretely, a semantics integrating a dynamic information flow analysis is proposed. This analysis makes use of static analyses results. This special semantics is built such ...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
International audienceNoninterference, which is an information flow property, is typically used as a...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Language-based information flow analysis is used to statically examine a program for information flo...
This paper seeks to answer fundamental questions about trade-offs between static and dynamic securit...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
International audienceNoninterference, which is an information flow property, is typically used as a...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Language-based information flow analysis is used to statically examine a program for information flo...
This paper seeks to answer fundamental questions about trade-offs between static and dynamic securit...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...