<p>Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world by accident or malice. Protecting the access to information is not enough to solve this problem. We have to ensure that the program uses the information in a secure way.</p> <p>Work on information flow security often ignores information flows through covert channels even though they pose a serious threat. In the first paper we present a framework for timing-aware information-flow type systems for a low-level language similar to a non-trivial subset of a sequential Java bytecode. The framework is parametrised over a time model of the instructions of the language and over t...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
This paper explores information flow control in systems in which the security classes of data can v...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
We consider a sequential object-oriented language with pointers and mutable state, private fields an...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
This paper specifies a nontermination-insensitive, interprocedural, information flow analysis for ob...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
This paper explores information flow control in systems in which the security classes of data can v...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
A common theoretical assumption in the study of information flow security in Java-like languages is ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
We consider a sequential object-oriented language with pointers and mutable state, private fields an...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
This paper specifies a nontermination-insensitive, interprocedural, information flow analysis for ob...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
This paper explores information flow control in systems in which the security classes of data can v...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...