This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that characterizes secure information flow for multi-threaded programs under a given scheduler. Scheduler-specificness allows us to reason about refinement attacks, an important and tricky class of attacks that are notorious in practice. SSOD imposes two conditions: (SSOD-1)~all individual public variables have to evolve deterministically, expressed by requiring stuttering equivalence between the traces of each individual public variable, and (SSOD-2)~the r...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
A program which has access to your sensitive data presents a security threat. Does the program kee...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Confidentiality is an important concern in today's information society: electronic payment and perso...
Observational determinism has been proposed in the literature as a way to ensure condentiality for m...
Confidentiality is an important concern in today’s informa- tion society: electronic payment and per...
Confidentiality is an important concern in today’s informa- tion society: electronic payment and per...
In today's information-based society, guaranteeing information security plays an important role in a...
Part 1: PrivacyInternational audienceThis paper proposes an approach to verify information flow secu...
This paper studies observational determinism, a gener-alisation of non-interference for multi-thread...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
A program which has access to your sensitive data presents a security threat. Does the program kee...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Confidentiality is an important concern in today's information society: electronic payment and perso...
Observational determinism has been proposed in the literature as a way to ensure condentiality for m...
Confidentiality is an important concern in today’s informa- tion society: electronic payment and per...
Confidentiality is an important concern in today’s informa- tion society: electronic payment and per...
In today's information-based society, guaranteeing information security plays an important role in a...
Part 1: PrivacyInternational audienceThis paper proposes an approach to verify information flow secu...
This paper studies observational determinism, a gener-alisation of non-interference for multi-thread...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
A program which has access to your sensitive data presents a security threat. Does the program kee...