28,354 Hits in 7.3 sec

Page 9203 of Mathematical Reviews Vol. , Issue 2004k [page]

2004 Mathematical Reviews  
and model checking for checking secure information flow in concurrent systems.  ...  The paper presents an abstract interpretation method for checking secure information flow properties of concurrent systems. Secure information flows are expressed as temporal logic formulae.  ... 

Holographic vulnerability studies

Jedidiah R. Crandall, Daniela Oliveira
2012 Proceedings of the 2012 workshop on New security paradigms - NSPW '12  
In this paper we propose a new paradigm for vulnerability studies: we view vulnerabilities as fractures in the interpretation of information as the information flows across the boundaries of different  ...  abstractions.  ...  Acknowledgments We would like to thank the NSPW anonymous reviewers, our shepherd, Paul van Oorschot and all the workshop attendeed for valuable feedback.  ... 
doi:10.1145/2413296.2413309 dblp:conf/nspw/CrandallO12 fatcat:ll6vefsbureadm4icdy2vbixum

Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond

Alessandro Aldini
2020 Electronic Proceedings in Theoretical Computer Science  
Quantitative aspects of computation are related to the use of both physical and mathematical quantities, including time, performance metrics, probability, and measures for reliability and security.  ...  Hence, they need to be integrated both at the level of system modeling and within the verification methodologies and tools.  ...  Information flow analysis and equivalence checking Information flow analysis and the problem of checking the leakage of sensitive data for programs received great attention, especially since the development  ... 
doi:10.4204/eptcs.312.1 fatcat:4fjvygbppjbq3k5ury2kvue3nq

Preliminary design of the SAFE platform

André DeHon, Sumit Ray, Olin Shivers, Jonathan M. Smith, Gregory Sullivan, Ben Karel, Thomas F. Knight, Gregory Malecha, Benoît Montagu, Robin Morisset, Greg Morrisett, Benjamin C. Pierce (+1 others)
2011 Proceedings of the 6th Workshop on Programming Languages and Operating Systems - PLOS '11  
Safe is a clean-slate design for a secure host architecture. It integrates advances in programming languages, operating systems, and hardware and incorporates formal methods at every step.  ...  We sketch the current state of the design and discuss several of these choices.  ...  of information on today's systems and the hostile networked environment in which they must operate, such concessions for security are now warranted for many systems.  ... 
doi:10.1145/2039239.2039245 dblp:conf/sosp/DeHonKKMMMMPPRS11 fatcat:3zbmz6v65rbm7aw3gtbvr4yukm

Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels

Marcus V
2008 2008 Third International Conference on Availability, Reliability and Security  
Unlike prior approaches, their method allows for temporary breaches of confidentiality. However, they share the commonly made assumption that programs run entirely in private memory.  ...  This paper extends Warnier's approach in two fundamental aspects: shared memory and synchronisation.  ...  The extended algorithm not only detects whether secrets initially in the checked program are leaked, but also whether this program forwards secrets from other programs.  ... 
doi:10.1109/ares.2008.56 dblp:conf/IEEEares/Volp08 fatcat:deg5jitc5nfjplgrfvbf43ybwe

Language-based information-flow security

A. Sabelfeld, A.C. Myers
2003 IEEE Journal on Selected Areas in Communications  
Recently, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies.  ...  In this article we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies.  ...  Hicks for helpful comments and the anonymous reviewers for useful feedback.  ... 
doi:10.1109/jsac.2002.806121 fatcat:elktqhzkyfcqhb7kcghzi4j3pe

Verifying Information Flow Control over Unbounded Processes [chapter]

William R. Harris, Nicholas A. Kidd, Sagar Chaki, Somesh Jha, Thomas Reps
2009 Lecture Notes in Computer Science  
., and Vaziri, M., Finding Concurrency-Related Bugs using Random Isolation. In Veri cation, Model Checking, and Abstract Interpretation (VMCAI), January .  ...  ., and Kidd, N., Anomaly Detection as a Reputation System for Online Auctioning. In Computer and Communi- cations Security (CCS), November .  ... 
doi:10.1007/978-3-642-05089-3_49 fatcat:ishob53fangijksm5gpzo5fypu

Framework for the Formal Specification and Verification of Security Guidelines

Zeineb Zhioua, Rabea Ameur-Boulifa, Yves Roudier
2018 Advances in Science, Technology and Engineering Systems  
checking analysis together with information flow analysis.  ...  In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle by combining both the model  ...  [26] combine abstract interpretation and model checking to check secure information flow in concurrent systems.  ... 
doi:10.25046/aj030106 fatcat:p6hdgic4nzak5mfbyhyhchfudi

Secure information flow for a concurrent language with scheduling

Gilles Barthe, Leonor Prensa Nieto
2007 Journal of Computer Security  
Using the proof assistant Isabelle/HOL, we have specified an information flow type system for a concurrent language featuring primitives for scheduling, and shown that typable programs are non-interfering  ...  Information flow type systems provide an elegant means to enforce confidentiality of programs.  ...  Acknowledgments Thanks to the anonymous referees for their comments on the paper, to G. Boudol, I. Castellani, and A. Matos for discussions around [13] 36 and [29] , and to S. Merz, C.  ... 
doi:10.3233/jcs-2007-15604 fatcat:4eygbbx7fjhmljm2e6m5e7em2q

Automated techniques for higher-order program verification

Naoki KOBAYASHI, Luke ONG, David Van HORN
2013 Progress in Informatics  
flow analyses, and abstract interpretation.  ...  automata have yielded model checkers for higher-order functional programs.  ...  and Abstract Interpretation, to infer (and check) suitable program invariants.  ... 
doi:10.2201/niipi.2013.10.9 fatcat:xqfyvx6m25d4jcodwl373vlxlq

High Performance Static Analysis for Industry

Mark Bradley, Franck Cassez, Ansgar Fehnker, Thomas Given-Wilson, Ralf Huuck
2012 Electronical Notes in Theoretical Computer Science  
In this work we present an empirical study of our industrial strength source code analysis tool Goanna that uses a model checking core for static analysis of C/C++ code.  ...  However, with the introduction of more sophisticated algorithmic techniques, such as model checking and constraint solving, questions about performance are a major concern.  ...  An example is checking for the flow of tainted data in a security context.  ... 
doi:10.1016/j.entcs.2012.11.002 fatcat:5s7bkaya5bahjcoeolypxrkxou

Games and Decisions for Rigorous Systems Engineering (Dagstuhl Seminar 12461)

Nikolaj Bjorner, Krishnendu Chatterjee, Laura Kovacs, Rupak M. Majumdar, Marc Herbstritt
2013 Dagstuhl Reports  
This report documents the program and the outcomes of the Dagstuhl Seminar 12461 "Games and Decisions for Rigorous Systems Engineering".  ...  This event was the first seminar of this kind and a kickoff of a series of seminars organised on rigorous systems engineering.  ...  Using PIA for both data abstraction and a new form of counter abstraction, we reduce the parameterized problem to finite-state model checking.  ... 
doi:10.4230/dagrep.2.11.45 dblp:journals/dagstuhl-reports/BjornerCKM12 fatcat:gs36midqlvfhzky6v7ebawumtq

Formal Software Analysis Emerging Trends in Software Model Checking

Matthew B. Dwyer, John Hatcliff, Robby Robby, Corina S. Pasareanu, Willem Visser
2007 Future of Software Engineering (FOSE '07)  
We review emerging trends in software model checking and identify future directions that promise to significantly improve its cost-effectiveness.  ...  Future of Software Engineering(FOSE'07) 0-7695-2829-5/07 $20.00 Abstract The study of methodologies and techniques to produce correct software has been active for four decades.  ...  concurrent system, and thus is very wellsuited for revealing intricate concurrency bugs that are hard to detect using traditional quality assurance methods. ⊕ More scalable than model-checking since information  ... 
doi:10.1109/fose.2007.6 dblp:conf/icse/DwyerHRPV07 fatcat:ucvmmm75kjbyxluplh5z3y3x4q

Stateless Code Model Checking of Information Flow Security [article]

Elaheh Ghassabani, Mohammad Abdollahi Azgomi
2016 arXiv   pre-print
In this paper, we propose a new method for verifying information flow security in concurrent programs. For the first time, we use stateless code model checking to verify observational determinism.  ...  Observational determinism is a security property that characterizes secure information flow for multithreaded programs.  ...  Acknowledgement We are grateful to Iran National Science Foundation (INSF) for financial support of this research.  ... 
arXiv:1603.03533v1 fatcat:ifg37ha67bfxdken2xoahvnm5q

PhD Abstracts

2019 Journal of functional programming  
Many students complete PhDs in functional programming each year.  ...  As a service to the community, twice per year the Journal of Functional Programming publishes the abstracts from PhD dissertations completed during the previous year.  ...  Intuitively, IFC systems associate data with security labels that track and restrict flows of information throughout a program in order to enforce security.  ... 
doi:10.1017/s0956796819000078 fatcat:nqlt4e66r5ea5ibvngbewqpvs4
« Previous Showing results 1 — 15 out of 28,354 results