Filters








20,727 Hits in 7.7 sec

End-to-end verification of information-flow security for C and assembly programs

David Costanzo, Zhong Shao, Ronghui Gu
<span title="">2016</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jpubwsjaozha5itdes6pzyz2fm" style="color: black;">Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2016</a> </i> &nbsp;
In this paper, we present a novel methodology for formally verifying end-to-end security of a software system that consists of both C and assembly programs.  ...  Unfortunately, because today's system software still consists of both C and assembly programs, the end-to-end verification necessarily requires that we not only prove the security properties of individual  ...  Acknowledgments We thank Benjamin Pierce, members of the CertiKOS team at Yale, our shepherd Stephen McCamant, and anonymous referees for helpful comments and suggestions that improved this paper and the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2908080.2908100">doi:10.1145/2908080.2908100</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/pldi/CostanzoSG16.html">dblp:conf/pldi/CostanzoSG16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dbwcfqumbjcjnj5o7kitaaesoy">fatcat:dbwcfqumbjcjnj5o7kitaaesoy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200325145142/https://apps.dtic.mil/dtic/tr/fulltext/u2/1015496.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/64/a564b19f8c44eda06af203e17759d1c22a98b414.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2908080.2908100"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Mahmod
<span title="2009-02-01">2009</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wake4w3hqzd4ndiy2zowpciv64" style="color: black;">Journal of Computer Science</a> </i> &nbsp;
Results: A verification tool for verifying assembly programs for information flow security was built.  ...  A mobile program (in its assembly form) was analyzed for information flow security based on the concept of proof-carrying code.  ...  CONCLUSION We have presented a security technique that allows the verification of assembly programs for secure information flow.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcs.2009.163.171">doi:10.3844/jcs.2009.163.171</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l4d3l24mrjb3vcmauzaxkhsbom">fatcat:l4d3l24mrjb3vcmauzaxkhsbom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090424130113/http://www.scipub.org:80/fulltext/jcs/jcs52163-171.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/d0/0ad04d6f3224484575bc0be1c1db7ed617299b01.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcs.2009.163.171"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana
<span title="2009-02-01">2009</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wake4w3hqzd4ndiy2zowpciv64" style="color: black;">Journal of Computer Science</a> </i> &nbsp;
Results: A verification tool for verifying assembly programs for information flow security was built.  ...  A mobile program (in its assembly form) was analyzed for information flow security based on the concept of proof-carrying code.  ...  CONCLUSION We have presented a security technique that allows the verification of assembly programs for secure information flow.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2009.163.171">doi:10.3844/jcssp.2009.163.171</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uyjcq4aohjcl5huj2rnnlj2aoi">fatcat:uyjcq4aohjcl5huj2rnnlj2aoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090424130113/http://www.scipub.org:80/fulltext/jcs/jcs52163-171.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/d0/0ad04d6f3224484575bc0be1c1db7ed617299b01.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2009.163.171"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Design and Verification Methodology for a TrustZone Trusted Execution Environment

Haiyong Sun, Hang Lei
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
ACKNOWLEDGMENT We thank to the paper reviewers for their many valuable comments. We also thank to AJE for its linguistic assistance during the preparation of this manuscript.  ...  We also presented a modular verification framework for verifying the end-to-end security of C and ARM assembly programs.  ...  The platform integrates C code verification, assembly code verification, programme abstraction, and the end-to-end property proofs. We have discussed the end-to-end security and its proofs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2974487">doi:10.1109/access.2020.2974487</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/efkxklgmlbah5jbp4nxpegfyau">fatcat:efkxklgmlbah5jbp4nxpegfyau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200218074332/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09000841.pdf?tp=&amp;arnumber=9000841&amp;isnumber=6514899&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2974487"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Formal Methods Research at SICS and KTH

Mads Dam, Lars-Åke Fredlund, Dillian Gurov
<span title="">2003</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
Most work is based on the multi-level security model in which objects are assigned partially ordered security labels, and for a secure program the task is to show that information does not flow downward  ...  using call-graph abstractions and compositional techniques; (iii) Formalisation and analysis of security properties, in the areas of information flow control, authorisation, and verification of security  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1571-0661(04)80824-7">doi:10.1016/s1571-0661(04)80824-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3rhsokuaw5haxa32nhwne63h7q">fatcat:3rhsokuaw5haxa32nhwne63h7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190327173140/https://core.ac.uk/download/pdf/82676376.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/98/8598118324fd28c4746e5fd98b799b0c5baa77d6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1571-0661(04)80824-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Machine code verification of a tiny ARM hypervisor

Mads Dam, Roberto Guanciale, Hamed Nemati
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 3rd international workshop on Trustworthy embedded devices - TrustED &#39;13</a> </i> &nbsp;
To enable the adoption of the BAP back-ends to compute weakest preconditions and control flow graphs, a HOL4-based tool was implemented that transforms ARMv7 assembly programs to the BAP Intermediate Language  ...  We present our verification strategy, which mixes the usage of the theorem prover HOL4, the computation of weakest preconditions, and the use of SMT solvers to largely automate the verification process  ...  We developed a set of tools that integrate HOL4 and GDB to extract information from the C source code and the compiled assembly.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2517300.2517302">doi:10.1145/2517300.2517302</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/DamGN13.html">dblp:conf/ccs/DamGN13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2noqngkwjrdqpagf56nmrojyde">fatcat:2noqngkwjrdqpagf56nmrojyde</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922024441/http://kth.diva-portal.org/smash/get/diva2:675838/FULLTEXT01" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/6b/f06b4443f5b567667957916d600025a2d94430d1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2517300.2517302"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Typed Assembly Language for Confidentiality [chapter]

Dachuan Yu, Nayeem Islam
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Techniques at a source level do not generalize straightforwardly to assembly code, because assembly code does not readily present certain abstraction about the program structure that is crucial to information-flow  ...  In particular, we propose a type system for low-level information-flow analysis.  ...  Acknowledgments We wish to thank Eduardo Bonelli, Adriana Compagnoni, Ricardo Medel, Greg Morrisett, Steve Zdancewic and the anonymous referees for helpful comments on previous drafts of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11693024_12">doi:10.1007/11693024_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/u5znspbfl5cyvaklq6ctesrap4">fatcat:u5znspbfl5cyvaklq6ctesrap4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061212091154/http://www.docomolabs-usa.com:80/pdf/DCL-TR-2005-0002.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/c8/90c852e3ecf90e4f5e94541bf3e2391a92ae5fb7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11693024_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Preliminary design of the SAFE platform

André DeHon, Sumit Ray, Olin Shivers, Jonathan M. Smith, Gregory Sullivan, Ben Karel, Thomas F. Knight, Gregory Malecha, Benoît Montagu, Robin Morisset, Greg Morrisett, Benjamin C. Pierce (+1 others)
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jj2vupi7offrtmqekd7qqfaxdm" style="color: black;">Proceedings of the 6th Workshop on Programming Languages and Operating Systems - PLOS &#39;11</a> </i> &nbsp;
Safe is a clean-slate design for a secure host architecture. It integrates advances in programming languages, operating systems, and hardware and incorporates formal methods at every step.  ...  We sketch the current state of the design and discuss several of these choices.  ...  Least-privilege design helps minimize the effects of breaches; end-to-end information-flow tracking allows potentially malicious low-integrity inputs to be identified and treated with greater care; and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2039239.2039245">doi:10.1145/2039239.2039245</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sosp/DeHonKKMMMMPPRS11.html">dblp:conf/sosp/DeHonKKMMMMPPRS11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3zbmz6v65rbm7aw3gtbvr4yukm">fatcat:3zbmz6v65rbm7aw3gtbvr4yukm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813002127/http://www.crash-safe.org/assets/plos11-final_0.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/2d/872dc88b9c630c10924e79d4c0da20454ec7e364.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2039239.2039245"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Automating Information Flow Analysis of Low Level Code

Musard Balliu, Mads Dam, Roberto Guanciale
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
In this work we propose a novel approach to relational verification for machine code. Verification goals are expressed as equivalence of traces decorated with observation points.  ...  Information flow properties create additional complications: They are hyperproperties relating multiple executions, and the possibility of interrupts and concurrency, and use of devices and features like  ...  Acknowledgments The authors thank the anonymous reviewers for valuable comments. This work is supported by framework grant "IT 2010" from the Swedish Foundation for Strategic Research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660322">doi:10.1145/2660267.2660322</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BalliuDG14.html">dblp:conf/ccs/BalliuDG14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbbl7y5ofnbenhaqqxukilztlu">fatcat:kbbl7y5ofnbenhaqqxukilztlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922023446/http://kth.diva-portal.org/smash/get/diva2:743673/FULLTEXT01" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/52/79524383a7981cb39cd1a100c64dd4082c6a6777.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660322"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Clean-Slate Development of Certified OS Kernels

Zhong Shao
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v2jnxq36qfdxhby7zfh6sfsc4e" style="color: black;">Proceedings of the 2015 Conference on Certified Programs and Proofs - CPP &#39;15</a> </i> &nbsp;
Programming languages for building end-to-end certified kernels. OS kernels must address a multitude of abstraction layers and programming concerns.  ...  flow control), and then link everything together to build end-to-end certified systems.  ...  To turn certified C programs into certified assembly components suitable for linking in the OCAP framework, we also plan to use VeriML to build a certifying compiler [75] for a small subset of C.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2676724.2693180">doi:10.1145/2676724.2693180</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cpp/Shao15.html">dblp:conf/cpp/Shao15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ffiwrhqsdnbcflselj27eevbre">fatcat:ffiwrhqsdnbcflselj27eevbre</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829130300/http://flint.cs.yale.edu:80/flint/publications/ctos.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/56/f056b596d55b0ae65d35252cc088403ba1186e71.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2676724.2693180"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Binary Code Software Weakness Analysis Method based on Smart Intermediate Language in Embedded Environment

Junho Jeong, Yunsik Son, Seman Oh
<span title="2017-10-30">2017</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kx4szfp7xvfn7laozkx3mc4iqe" style="color: black;">International Journal of Software Engineering and Its Applications</a> </i> &nbsp;
As a result, the use of unverified third-party libraries is increasing the number of security incidents such as HeartBleed. However, it is very difficult to verify the security of binary libraries.  ...  Therefore, we need to deduce the size of the local variable through the declaration of the risk function.  ...  Acknowledgments The authors gratefully acknowledge the financial support provided by Defense Acquisition Program Administration and˙Agency for Defense Development under the contract UD160035ED.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijseia.2017.11.10.05">doi:10.14257/ijseia.2017.11.10.05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iug2iuppl5fe3kasoaxprz3cya">fatcat:iug2iuppl5fe3kasoaxprz3cya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603183040/http://www.sersc.org/journals/IJSEIA/vol11_no10_2017/5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/ff/abff3a736783b02f5f2fce7599a5e96cc164791a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijseia.2017.11.10.05"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Software Countermeasures for Control Flow Integrity of Smart Card C Codes [chapter]

Jean-François Lalande, Karine Heydemann, Pascal Berthomé
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Fault attacks can target smart card programs in order to disrupt an execution and gain an advantage over the data or the embedded functionalities.  ...  The proposed software countermeasures defeat 100% of attacks that jump over at least two C source code statements or beyond.  ...  In this section, we present the models used for program execution from a control flow point of view and for jump attacks, as well as properties to check to ensure the control flow integrity of a secured  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-11212-1_12">doi:10.1007/978-3-319-11212-1_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nlondd6pyjalnbr4dukk3q2y7a">fatcat:nlondd6pyjalnbr4dukk3q2y7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190416212851/https://core.ac.uk/download/pdf/52797488.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/26/d72653a206f5338a70e35bc2d8449e6ea223db54.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-11212-1_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Deriving an information flow checker and certifying compiler for Java

G. Barthe, D. Naumann, T. Rezk
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/inod5dqjxfdj3bnjykkklcg7d4" style="color: black;">2006 IEEE Symposium on Security and Privacy (S&amp;P&#39;06)</a> </i> &nbsp;
The technique is applied to an information flow type system for a fragment of Java with exceptions, thus confronting challenges in both control and data flow tracking.  ...  as a solution to enforce information flow and resource control policies.  ...  Acknowledgments: We thank Martín Abadi, Anindya Banerjee, Ricardo Medel, Andrei Sabelfeld and anonymous reviewers for providing valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2006.13">doi:10.1109/sp.2006.13</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sp/BartheRN06.html">dblp:conf/sp/BartheRN06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bi6u2qwncnh6znhzoxjcd2ur3q">fatcat:bi6u2qwncnh6znhzoxjcd2ur3q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060920063223/http://www.cs.stevens.edu/~naumann/publications/barthe-naumann-rezk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/ef/e2ef5e1d13241c26c1813736b0a7a2c9b849d963.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2006.13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

NSGA-II-Based Granularity-Adaptive Control-Flow Attestation

Jing Zhan, Yongzhen Li, Yifan Liu, Hongchao Li, Shuai Zhang, Li Lin, Chunhua Su
<span title="2021-11-18">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Besides, runtime protection for the GACFA at the program end with SGX is proposed to protect the integrity and confidentiality of control-flow measurement data.  ...  The experiments show that our work can find out the best-so-far control-flow granularity with stability and provide secure program attestation for the verifier.  ...  information of the program to be verified and thus can help ensure the integrity and confidentiality of the verification process.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/2914192">doi:10.1155/2021/2914192</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s2o57x7hd5ajdlrnwbra3qsg7i">fatcat:s2o57x7hd5ajdlrnwbra3qsg7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220115035241/https://downloads.hindawi.com/journals/scn/2021/2914192.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/9c/ee9cbefcd7e4db1d0b8dfaaecfea871ef202f502.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/2914192"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

FaCT: A Flexible, Constant-Time Programming Language

Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/avm5z57qt5hgnm7kc2erdkvx5i" style="color: black;">2017 IEEE Cybersecurity Development (SecDev)</a> </i> &nbsp;
We argue that C is unsuitable for writing timingchannel free cryptographic code that is both fast and readable.  ...  timing-channel free assembly code.  ...  ACKNOWLEDGEMENTS We thank David Kohlbrenner, Ariana Mirian, Hovav Shacham, and the anonymous reviewers for their insightful comments and suggestions. We give special thanks to Riad S.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/secdev.2017.24">doi:10.1109/secdev.2017.24</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/secdev/CauligiSBJHJS17.html">dblp:conf/secdev/CauligiSBJHJS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ndarhthoa5gxhn2p73httj2afa">fatcat:ndarhthoa5gxhn2p73httj2afa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171025095457/http://cseweb.ucsd.edu/~dstefan/pubs/cauligi:2017:fact.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/33/bb331a430f411e897793c612c323d2af8a3037fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/secdev.2017.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 20,727 results