We present a method based on abstract interpretation to check secure information flow in programs with dynamic structures where input and output channels are associated with security levels. In the concrete operational semantics each value is annotated by a security level dynamically taking into account both the explicit and the implicit information flows. We define a collecting semantics which associates with each program point the set of concrete states of the machine when the point is reached. The abstract domains are obtained from the concrete ones by keeping the security levels and forgetting the actual values. Using this framework, we define an abstract semantics, called instruction-level security typing, that allows us to certify a l...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
AbstractA classic problem in security is that of checking that a program has secure information flow...
This thesis investigates the specification and the application of dynamic security policies in infor...
If we classify variables in a program into various security levels, then a secure information flow a...
This paper explores information flow control in systems in which the security classes of data can v...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
This paper explores information flow control in systems in which the security classes of data can va...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
AbstractA classic problem in security is that of checking that a program has secure information flow...
This thesis investigates the specification and the application of dynamic security policies in infor...
If we classify variables in a program into various security levels, then a secure information flow a...
This paper explores information flow control in systems in which the security classes of data can v...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
This paper explores information flow control in systems in which the security classes of data can va...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security of Java programs is important as they can be executed in different platforms. This paper ad...