Suchergebnisse - Language-based Information Flow Security

  1. 1

    Language-based information-flow security von Sabelfeld, A., Myers, A.C.

    ISSN: 0733-8716, 1558-0008
    Veröffentlicht: New York IEEE 01.01.2003
    Veröffentlicht in IEEE journal on selected areas in communications (01.01.2003)
    “… ; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies …”
    Volltext
    Journal Article
  2. 2

    On-the-fly inlining of dynamic security monitors von Magazinius, Jonas, Russo, Alejandro, Sabelfeld, Andrei

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.10.2012
    Veröffentlicht in Computers & security (01.10.2012)
    “… ? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels …”
    Volltext
    Journal Article
  3. 3

    Jif: Language-based Information-flow Security in Java von Pullicino, Kyle

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 30.12.2014
    Veröffentlicht in arXiv.org (30.12.2014)
    “… We list the main features of Jif and discuss the information flow problem that Jif helps to solve …”
    Volltext
    Paper
  4. 4

    Towards Language-Based Mitigation of Traffic Analysis Attacks von Blaabjerg, Jeppe Fredsgaard, Askarov, Aslan

    ISSN: 2374-8303
    Veröffentlicht: IEEE 01.06.2021
    “… them, and the problem has received little attention in the language-based information flow literature …”
    Volltext
    Tagungsbericht
  5. 5

    Instruction-level security analysis for information flow in stack-based assembly languages von De Francesco, Nicoletta, Martini, Luca

    ISSN: 0890-5401, 1090-2651
    Veröffentlicht: San Diego, CA Elsevier Inc 01.09.2007
    Veröffentlicht in Information and computation (01.09.2007)
    “… We propose a method to analyze secure information flow in stack-based assembly languages, communicating with the external environment by means of input and output channels …”
    Volltext
    Journal Article
  6. 6

    QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment von Guo, Xiaolong, Dutta, Raj Gautam, He, Jiaji, Tehranipoor, Mark M., Jin, Yier

    Veröffentlicht: IEEE 01.05.2019
    “… As a result, various security solutions have been developed to protect ICs, among which the language-based hardware security verification serves as a promising solution …”
    Volltext
    Tagungsbericht
  7. 7

    A scalable entropy estimator von Golia, Priyanka, Juba, Brendan, Meel, Kuldeep S.

    ISSN: 0925-9856, 1572-8102
    Veröffentlicht: New York Springer US 01.08.2025
    Veröffentlicht in Formal methods in system design (01.08.2025)
    “… ) in programming-language-based security. Here, information-theoretic quantities capture the effort required on the part of an adversary to obtain access to confidential …”
    Volltext
    Journal Article
  8. 8

    Nontransitive Security Types for Coarse-grained Information Flow Control von Lu, Yi, Zhang, Chenyi

    ISSN: 2374-8303
    Veröffentlicht: IEEE 01.06.2020
    “… Language-based information flow control (IFC) aims to provide guarantees about information propagation in computer systems having multiple security levels …”
    Volltext
    Tagungsbericht
  9. 9

    A monadic analysis of information flow security with mutable state von CRARY, KARL, KLIGER, ALEKSEY, PFENNING, FRANK

    ISSN: 0956-7968, 1469-7653
    Veröffentlicht: Cambridge, UK Cambridge University Press 01.03.2005
    Veröffentlicht in Journal of functional programming (01.03.2005)
    “… Our analysis is based on a logic of information flow derived from lax logic and the monadic metalanguage …”
    Volltext
    Journal Article
  10. 10

    Security types preserving compilation von Barthe, Gilles, Rezk, Tamara, Basu, Amitabh

    ISSN: 1477-8424, 1873-6866
    Veröffentlicht: Elsevier Ltd 01.07.2007
    Veröffentlicht in Computer languages, systems & structures (01.07.2007)
    “… ” (Sabelfeld and Myers, [Language-based information-flow security. IEEE Journal on Selected Areas in Communications 2003; 21:5–19 …”
    Volltext
    Journal Article
  11. 11

    Securing Class Initialization in Java-like Languages von Rafnsson, W., Nakata, K., Sabelfeld, A.

    ISSN: 1545-5971, 1941-0018, 1941-0018
    Veröffentlicht: Washington IEEE 01.01.2013
    “… Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs …”
    Volltext
    Journal Article
  12. 12

    Towards Language-Based Mitigation of Traffic Analysis Attacks von Jeppe Fredsgaard Blaabjerg, Aslan Askarov

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 24.06.2021
    Veröffentlicht in arXiv.org (24.06.2021)
    “… them, and the problem has received little attention in the language-based information flow literature …”
    Volltext
    Paper
  13. 13

    Compositional Security for Reentrant Applications von Cecchetti, Ethan, Yao, Siqiu, Ni, Haobin, Myers, Andrew C.

    ISSN: 2375-1207
    Veröffentlicht: IEEE 01.05.2021
    “… power of safe forms of reentrancy. We present a security type system that provably enforces secure information flow …”
    Volltext
    Tagungsbericht
  14. 14

    A Field-Sensitive Security Monitor for Object-Oriented Programs von Khakpour, Narges

    ISSN: 0167-4048, 1872-6208, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.09.2021
    Veröffentlicht in Computers & security (01.09.2021)
    “… flow violations and applies suitable countermeasures to prevent violations. We introduce an approach for modeling heap and information flow via heap …”
    Volltext
    Journal Article
  15. 15

    Information Flow Control for Distributed Trusted Execution Environments von Gollamudi, Anitha, Chong, Stephen, Arden, Owen

    ISSN: 2374-8303
    Veröffentlicht: IEEE 01.06.2019
    “… Distributed applications cannot assume that their security policies will be enforced on untrusted hosts …”
    Volltext
    Tagungsbericht
  16. 16

    SoK: Shining Light on Shadow Stacks von Burow, Nathan, Zhang, Xinping, Payer, Mathias

    ISSN: 2375-1207
    Veröffentlicht: IEEE 01.05.2019
    “… Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity …”
    Volltext
    Tagungsbericht
  17. 17

    Information Flow Control for Serverless Systems von Chawla, Rishabh

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2021
    “… Security for Serverless Systems is looked at from two perspectives, the server-level security managed by the infras-tructure company and the Application level Security managed …”
    Volltext
    Journal Article
  18. 18

    IFCIL: An Information Flow Configuration Language for SELinux von Ceragioli, Lorenzo, Galletta, Letterio, Degano, Pierpaolo, Basin, David

    Veröffentlicht: IEEE 01.08.2022
    “… However, CIL lacks mechanisms for ensuring that the resulting configurations obey desired information flow policies …”
    Volltext
    Tagungsbericht
  19. 19

    Secure information sharing in social agent interactions using information flow analysis von Bijani, Shahriar, Robertson, David, Aspinall, David

    ISSN: 0952-1976, 1873-6769
    Veröffentlicht: Elsevier Ltd 01.04.2018
    Veröffentlicht in Engineering applications of artificial intelligence (01.04.2018)
    “… ), a compact executable specification language based on logic programming and pi-calculus. Open multi-agent systems have experienced growing popularity in the multi-agent …”
    Volltext
    Journal Article
  20. 20

    Integrating Information Flow Analysis in Unifying Theories of Programming von Mu, Chunyan, Li, Guoqiang

    ISSN: 2473-3105
    Veröffentlicht: IEEE 01.12.2021
    “… This paper presents a formal approach for modelling and reasoning about information flow control in software systems under Hoare and He's Unifying Theories of Programming (UTP …”
    Volltext
    Tagungsbericht