Type systems for secure information flow aim to prevent a program from leaking information from H (high) to L (low) variables. Traditionally, bisimulation has been the prevalent technique for proving the soundness of such systems. This work introduces a new proof technique based on stripping and fast simulation, and shows that it can be applied in a number of cases where bisimulation fails. We present a progressive development of this technique over a representative sample of languages including a simple imperative language (core theory), a multiprocessing nondeterministic language, a probabilistic language, and a language with cryptographic primitives. In the core theory we illustrate the key concepts of this technique in a basic setting. ...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
In secure information flow analysis, the classic Denning restrictions allow a program’s termination ...
In secure information flow analysis, the classic Denning restrictions allow a program’s termination ...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
We give a formal definition of the notion of information flow for a simple guarded command language....
Abstract. Information flow control is an important area in computer security. It aims at restricting...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
To speak about the security of information flow in programs employing cryptographic operations, defi...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
In secure information flow analysis, the classic Denning restrictions allow a program’s termination ...
In secure information flow analysis, the classic Denning restrictions allow a program’s termination ...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
We give a formal definition of the notion of information flow for a simple guarded command language....
Abstract. Information flow control is an important area in computer security. It aims at restricting...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
To speak about the security of information flow in programs employing cryptographic operations, defi...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....