The problem of controlling information flow in multithreaded programs remains an important open challenge.A major difficulty for tracking information flow in concurrent programs is due to the internal timing covert channel. Information is leaked via this channel when secrets affect the timing behavior of a thread, which, via the scheduler, affects the interleaving of public events. This channel is particularly dangerous because, in contrast to external timing, the attacker does not need to observe the actual execution time of programs. This thesis introduces a novel treatment of the interaction between threads and the scheduler. As a result, a permissive security specification and a compositional security type system are obtained. The type ...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
We present the foundations for a new dynamic information flow control (IFC) parallel runtime system,...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The problem of controlling information flow in multithreaded programs remains an important open cha...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the i...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
The work presented in this thesis focuses on information-flow control systems for functional program...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
In today's information-based society, guaranteeing information security plays an important role in a...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
We present the foundations for a new dynamic information flow control (IFC) parallel runtime system,...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The problem of controlling information flow in multithreaded programs remains an important open cha...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the i...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
The work presented in this thesis focuses on information-flow control systems for functional program...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
In today's information-based society, guaranteeing information security plays an important role in a...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
We present the foundations for a new dynamic information flow control (IFC) parallel runtime system,...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...