International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion flow for Java bytecode. Our approach consists of computing, at all program points, an abstract memory graph (AMG) which tracks how input values of a method may influence its outputs. This computation subsumes a points-to anal- ysis (reflecting how objects depend on each other) by addressing dependencies arising from data of primitive types and from the control flow of the program. Our graph construction is proved to be sound for both intra-procedural and inter- procedural analysis by establishing a non-interference theorem stating that if an output value is unrelated to an input one in the AMG then the output remains un- changed when the input ...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
In this paper we present a flow-sensitive analysis for secure information flow for Java bytecode. Ou...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...