Many state-of-the-art IFC libraries support a variety of advanced features like mutuable data structures, exceptions, and concurrency, whose subtle interaction makes verification of security guarantees challenging. In this paper, we present a full-fledged, mechanically-verifiedmodel of MAC-a statically enforced IFC library. We describe three main insights gained during the formalization process. As previous libraries (e.g., LIO and HLIO), we utilize term erasure as the proof technique to show non-interference. This technique essentially states that the same public output should be produced if secrets are erased before or after program execution. Our first insight identifies challenges when the sensitivity of terms may depend on the context ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Many state-of-the-art IFC libraries support a variety of advanced features like mutuable data struct...
Information Flow Control (IFC) is a language-based security mechanism that tracks where data flows w...
The programming language Haskell plays a unique, privileged role in information-flow control (IFC) r...
Language-based information-flow control (IFC) techniques often rely on special purpose, ad-hoc primi...
Information Flow Control (IFC) is a principled approach to protecting the confidentiality and integr...
Many state-of-the-art information-flow control (IFC) tools are implemented as Haskell libraries. In ...
In programming language research, information-flow control (IFC) is a technique for enforcing a vari...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
We describe a language-based, dynamic information flow control (IFC) system called LIO. Our system p...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Many state-of-the-art IFC libraries support a variety of advanced features like mutuable data struct...
Information Flow Control (IFC) is a language-based security mechanism that tracks where data flows w...
The programming language Haskell plays a unique, privileged role in information-flow control (IFC) r...
Language-based information-flow control (IFC) techniques often rely on special purpose, ad-hoc primi...
Information Flow Control (IFC) is a principled approach to protecting the confidentiality and integr...
Many state-of-the-art information-flow control (IFC) tools are implemented as Haskell libraries. In ...
In programming language research, information-flow control (IFC) is a technique for enforcing a vari...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
To preserve confidentiality, information-flow control (IFC) restricts how untrusted code handles sec...
We describe a language-based, dynamic information flow control (IFC) system called LIO. Our system p...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...