In the context of systems security, information flows play a central role. Unhandled information flows potentially leave the door open to very dangerous types of security attacks, such as code injection or sensitive information leakage. Information flows verification is based on a notion of dependency between a system’s objects, which requires specifications expressing relations between different executions of a system. Specifications of this kind, called hyperproperties, go beyond classic trace properties, defined in terms of predicate over single executions. The problem of trace properties verification is well studied, both from a theoretical as well as a practical point of view. Unfortunately, very few works deal with the verification of...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
International audienceSymbolic execution is a program analysis technique commonly utilized to determ...
Abstract. Proof systems give absolute guarantees but are notoriously difficult to use for non-expert...
In the context of systems security, information flows play a central role. Unhandled information flo...
In the context of systems security, information flows play a central role. Unhandled information flo...
Hyperproperties are quickly becoming very popular in the context of systems security, due to their e...
International audienceWe show how static analysis for secure information flow can be expressed and p...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
In this paper, we consider the runtime verification problem of safety hyperproperties for determinis...
Hyperproperties are becoming the, de facto, standard for reasoning about systems executions. They di...
The importance of security and reliability of software systems makes formal methods of paramount sig...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Computer security policies often are stated informally in terms of confidential-ity, integrity, and ...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
Certain important security policies such as information flow characterize system-wide behaviors and ...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
International audienceSymbolic execution is a program analysis technique commonly utilized to determ...
Abstract. Proof systems give absolute guarantees but are notoriously difficult to use for non-expert...
In the context of systems security, information flows play a central role. Unhandled information flo...
In the context of systems security, information flows play a central role. Unhandled information flo...
Hyperproperties are quickly becoming very popular in the context of systems security, due to their e...
International audienceWe show how static analysis for secure information flow can be expressed and p...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
In this paper, we consider the runtime verification problem of safety hyperproperties for determinis...
Hyperproperties are becoming the, de facto, standard for reasoning about systems executions. They di...
The importance of security and reliability of software systems makes formal methods of paramount sig...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Computer security policies often are stated informally in terms of confidential-ity, integrity, and ...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
Certain important security policies such as information flow characterize system-wide behaviors and ...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
International audienceSymbolic execution is a program analysis technique commonly utilized to determ...
Abstract. Proof systems give absolute guarantees but are notoriously difficult to use for non-expert...