Filters








1,107 Hits in 2.5 sec

Noninterference via Symbolic Execution [chapter]

Dimiter Milushev, Wim Beck, Dave Clarke
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work we propose a novel, alternative approach: utilizing symbolic execution in combination with ideas from program logics in an attempt to increase the precision of analyses and automate noninterference  ...  The feasibility of the proposal is illustrated using a prototype tool based on the KLEE symbolic execution engine.  ...  Symbolic execution Symbolic execution [13] is a program analysis technique used to investigate the possible execution traces of a program.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30793-5_10">doi:10.1007/978-3-642-30793-5_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7i2esiblpff25hkarstnluckli">fatcat:7i2esiblpff25hkarstnluckli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815121440/https://lirias.kuleuven.be/bitstream/123456789/346050/1/LiriasEntry.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e3/17/e3171be76e399d9302b50af3d5783a558b00bcb2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30793-5_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A verified information-flow architecture

Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Cătălin Hriţcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach
<span title="2016-12-01">2016</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed.  ...  We present a formal, machine-checked model of the key hardware and software mechanisms used to control information flow in SAFE and an endto-end proof of noninterference for this model.  ...  The pair ( c s , c e ) defines a refinement via states between the symbolic rule machine and the concrete machine.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-15784">doi:10.3233/jcs-15784</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2gzaehcyhvbknd36qivbp3dtym">fatcat:2gzaehcyhvbknd36qivbp3dtym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829073847/http://people.irisa.fr/David.Pichardie/papers/popl14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/3d/603d4f74b55cac1737db85e9e200af14690e5758.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-15784"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A verified information-flow architecture

Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Cătălin Hriţcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2qaxtqe2rfgjnfefqcokcnzelq" style="color: black;">Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL &#39;14</a> </i> &nbsp;
At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed.  ...  We present a formal, machine-checked model of the key hardware and software mechanisms used to control information flow in SAFE and an endto-end proof of noninterference for this model.  ...  The pair ( c s , c e ) defines a refinement via states between the symbolic rule machine and the concrete machine.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2535838.2535839">doi:10.1145/2535838.2535839</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/popl/AmorimCDDHPPPT14.html">dblp:conf/popl/AmorimCDDHPPPT14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/caghr7pxirdnfhhgs7seyz7jgu">fatcat:caghr7pxirdnfhhgs7seyz7jgu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829073847/http://people.irisa.fr/David.Pichardie/papers/popl14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/3d/603d4f74b55cac1737db85e9e200af14690e5758.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2535838.2535839"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

ENCoVer: Symbolic Exploration for Information Flow Security

Musard Balliu, Mads Dam, Gurvan Le Guernic
<span title="">2012</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kea5jpvemrdmvbwvgh5jn6gog4" style="color: black;">2012 IEEE 25th Computer Security Foundations Symposium</a> </i> &nbsp;
We address the problem of program verification for information flow policies by means of symbolic execution and model checking.  ...  This is confirmed by experiments performed with ENCOVER, a tool based on Java PathFinder and Z3, which we have developed for epistemic noninterference concolic verification.  ...  In symbolic execution unknown input is represented as symbolic values and the output is computed as a function of these values [19] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2012.24">doi:10.1109/csf.2012.24</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/csfw/BalliuDG12.html">dblp:conf/csfw/BalliuDG12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zwavzr3cuna7bpdslrdsonptue">fatcat:zwavzr3cuna7bpdslrdsonptue</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170818184454/https://www.computer.org/csdl/proceedings/csf/2012/4718/00/4718a030.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/1d/111d3de4cf49259aaf557799699210591a8acd4a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2012.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Verified Information-Flow Architecture [article]

Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach
<span title="2016-03-06">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed.  ...  We use a refinement proof methodology to propagate the noninterference property of the abstract machine down to the concrete machine level.  ...  The pair ( c s , c e ) defines a refinement via states between the symbolic rule machine and the concrete machine.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1509.06503v2">arXiv:1509.06503v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ajryc67ilzhqbg2l435lpazaki">fatcat:ajryc67ilzhqbg2l435lpazaki</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200914204039/https://arxiv.org/pdf/1509.06503v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/33/7233dde6b72aac7350ec260976a605adf83d45ae.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1509.06503v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secure Information Flow by Model Checking Pushdown System [article]

Cong Sun, Liyong Tang, Zhong Chen
<span title="2010-12-14">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Because the type-based static analysis is sometimes too conservative and rejects safe program as ill-typed, we take a semantic-based approach by self-composing symbolic pushdown system and specifying noninterference  ...  Then we verify this LTL-expressed property via model checker Moped.  ...  First a symbolic pushdown system is derived from core-language program. Then we self-compose the derived symbolic pushdown system and express noninterference with LTL formula as the inputs of Moped.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1012.3100v1">arXiv:1012.3100v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t7jvx7isend7zlajfe6a4tlohi">fatcat:t7jvx7isend7zlajfe6a4tlohi</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1012.3100/1012.3100.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1012.3100v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Using Theorem Provers to Increase the Precision of Dependence Analysis for Information Flow Control [chapter]

Bernhard Beckert, Simon Bischof, Mihai Herda, Michael Kirsten, Marko Kleine Büning
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Applying a logical calculus with a deductive theorem prover, we can hence symbolically execute P and attempt to prove the formula.  ...  Furthermore, we need to introduce the concept of state updates [1] , which capture the effects of symbolically executing program statements.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-02450-5_17">doi:10.1007/978-3-030-02450-5_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d3efgbdhkbdxdgsw4yu7aeoy5a">fatcat:d3efgbdhkbdxdgsw4yu7aeoy5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200215114358/https://publikationen.bibliothek.kit.edu/1000088397/24669999" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/53/0553d6b57171d0b22efb7b04d564b7ace4345ba6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-02450-5_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Match It or Die: Proving Integrity by Equality [chapter]

Matteo Centenaro, Riccardo Focardi
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Secure usage of hash functions is also studied with respect to the confidentiality of digests by extending secret-sensitive noninterference of Demange and Sands.  ...  Integrity can be checked via noninterference by placing the observer at level H s H.  ...  If it were not, an opponent manipulating the low-integrity variable x might force the program to execute one of the two branches and gain control on the fact high-integrity variables are updated via c  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-16074-5_10">doi:10.1007/978-3-642-16074-5_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yn4krqxxuja6hdmlkxscjnuviu">fatcat:yn4krqxxuja6hdmlkxscjnuviu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171203085347/https://core.ac.uk/download/pdf/41124199.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/3f/883f52125fa94e4c7fb24d6850389566f5770f3e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-16074-5_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SecCSL: Security Concurrent Separation Logic [chapter]

Gidon Ernst, Toby Murray
<span title="">2019</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
At the same time it inherits the structure of traditional concurrent separation logics; thus SecCSL reasoning can be automated via symbolic execution.  ...  Symbolic Execution. SecC automates SecCSL through symbolic execution, as pioneered for SL in [7] .  ...  It inherits the structure of traditional concurrent separation logics, and so like those logics can be automated via symbolic execution [10, 22, 30] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-25543-5_13">doi:10.1007/978-3-030-25543-5_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/77im5rmvcbgu3b5helrlcfcufe">fatcat:77im5rmvcbgu3b5helrlcfcufe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200311130708/https://link.springer.com/content/pdf/10.1007%2F978-3-030-25543-5_13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/7e/be7e7172634d96fe07c09fbb73ad776cf2abb156.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-25543-5_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Explicit Secrecy: A Policy for Taint Tracking

Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u2svuludwbbl3kyi56ta4uqumm" style="color: black;">2016 IEEE European Symposium on Security and Privacy (EuroS&amp;P)</a> </i> &nbsp;
Finally, the definition is indirect, defining a weak policy, weak secrecy, via the stronger policy of noninterference.  ...  The program is executed on symbolic inputs, hence the state and the configuration are also symbolic.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2016.14">doi:10.1109/eurosp.2016.14</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurosp/SchoepeBPS16.html">dblp:conf/eurosp/SchoepeBPS16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cgiie4alujc7pdgn2arxocdvw4">fatcat:cgiie4alujc7pdgn2arxocdvw4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722012151/http://www.cse.chalmers.se/~andrei/eurosp16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/27/31/2731d5e5a0d681a08b007013a876d46676e4ead6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2016.14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [article]

Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson
<span title="2015-07-29">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Finally, we describe a prototype tool that uses symbolic execution to check interaction-based declassification policies for Android, and we show that it enforces policies correctly on a set of apps.  ...  We formalize a semantic security condition, interaction-based noninterference, to define our policies precisely.  ...  Driving App Execution Android apps use the Android framework's API, which includes classes for responding to events via callbacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1504.03711v2">arXiv:1504.03711v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7pvhmytqgfgtzls75juzpl6lky">fatcat:7pvhmytqgfgtzls75juzpl6lky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200911080412/https://arxiv.org/pdf/1504.03711v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/2a/662a1e2a58f9c9a6498900ccb6b2f3ba48b95155.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1504.03711v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [chapter]

Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Finally, we describe a prototype tool that uses symbolic execution of Dalvik bytecode to check interaction-based declassification policies for Android, and we show that it enforces policies correctly on  ...  We formalize a semantic security condition, interaction-based noninterference, to define our policies precisely.  ...  Driving App Execution Android apps use the Android framework's API, which includes classes for responding to events via callbacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-24177-7_26">doi:10.1007/978-3-319-24177-7_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/omwvzeakhjda3aqu32orgz6bca">fatcat:omwvzeakhjda3aqu32orgz6bca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170814142358/http://drum.lib.umd.edu/bitstream/handle/1903/16756/CS-TR-5044.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/a3/37a339314dad31ee44ef186720e5f7dd9eaec45c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-24177-7_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Spot the Difference: Secure Multi-execution and Multiple Facets [chapter]

Nataliia Bielova, Tamara Rezk
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We propose a rigorous comparison of two widely known dynamic information flow mechanisms: Secure Multi-Execution (SME) and Multiple Facets (MF).  ...  The symbol ⊥ is overloaded to denote a memory that maps every variable to ⊥ when the high execution does not terminate.  ...  We overload the symbol to also denote a memory that maps every variable to ⊥.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-45744-4_25">doi:10.1007/978-3-319-45744-4_25</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/runmbj3yxrbbjpemzt4dlvae6e">fatcat:runmbj3yxrbbjpemzt4dlvae6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724043612/https://hal.inria.fr/hal-01348192/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/86/298623e9baf308270d3d4ee88ec99b937d8e7c23.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-45744-4_25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Type-based information flow analysis for bytecode languages with variable object field policies

Francisco Bavera, Eduardo Bonelli
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uo6yx5jpgnf2zl7mkrumytd4ti" style="color: black;">Proceedings of the 2008 ACM symposium on Applied computing - SAC &#39;08</a> </i> &nbsp;
Also, we prove a noninterference result for this language.  ...  Given that JVM s tracks the types of fields via symbolic locations we also introduce a pair of (partial) bijections between symbolic locations and locations themselves: (β ¡ , β £ ).  ...  Noninterference Noninterference states that any two terminating runs of a well-typed method starting from indistinguishable initial states produce indistinguishable final states.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1363686.1363776">doi:10.1145/1363686.1363776</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sac/BaveraB08.html">dblp:conf/sac/BaveraB08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gtojrwcfxbb7pppfzo3foiq7he">fatcat:gtojrwcfxbb7pppfzo3foiq7he</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813001516/http://dc.exa.unrc.edu.ar/staff/fbavera/papers/BaveraBonelli-SAC08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/6a/526a0bc8d4705d8beda72365e368b7b639a6d760.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1363686.1363776"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Noninterference with Dynamic Security Domains and Policies [chapter]

Robert Grabowski, Lennart Beringer
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In proof-carrying code scenarios, it is desirable to give a single proof that the program executes securely in any of these situations.  ...  A type system is used to statically prove that the flow tests included in the program are sufficient, such that a noninterference property for the program is ensured regardless of the domains of objects  ...  the execution.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-10622-4_5">doi:10.1007/978-3-642-10622-4_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jvponhn275hqnhl6m5lbzol6ym">fatcat:jvponhn275hqnhl6m5lbzol6ym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151204084924/http://www2.tcs.ifi.lmu.de/~grabow/papers/grabowskiberinger2009_dynamicdomains.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/af/faaf7a2d6b65426496f785b7e670cd5b2841df55.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-10622-4_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,107 results