This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static information-flow analysis is a natural generalization of flow-insensitive static analysis, which allows accepting more secure programs. It has been also shown that sound purely dynamic information-flow enforcement is more permissive than static analysis in the flow-insensitive case. We argue that the step from flow-insensitive to flow-sensitive is fundamentally limited for purely dynamic information-flow controls. We prove impossibility of a sound purely dynamic information-flow monitor that accepts programs certified by a classical flow-sensitive static analysis. A side impl...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Flow-sensitive dynamic enforcement mechanisms for information flow labels offer increased permissive...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
Security policies are naturally dynamic. Reflecting this, there has been a growing interest in study...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Over the years, computer systems and applications have grown significantly complex while handling a ...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Flow-sensitive dynamic enforcement mechanisms for information flow labels offer increased permissive...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
Security policies are naturally dynamic. Reflecting this, there has been a growing interest in study...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Over the years, computer systems and applications have grown significantly complex while handling a ...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Flow-sensitive dynamic enforcement mechanisms for information flow labels offer increased permissive...
This paper presents a language in which information flow is securely controlled by a type system, ye...