Search Results - Language-based Information Flow Security

Refine Results
  1. 1

    Language-based information-flow security by Sabelfeld, A., Myers, A.C.

    ISSN: 0733-8716, 1558-0008
    Published: New York IEEE 01.01.2003
    “…; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies…”
    Get full text
    Journal Article
  2. 2

    On-the-fly inlining of dynamic security monitors by Magazinius, Jonas, Russo, Alejandro, Sabelfeld, Andrei

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.10.2012
    Published in Computers & security (01.10.2012)
    “…? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels…”
    Get full text
    Journal Article
  3. 3

    Jif: Language-based Information-flow Security in Java by Pullicino, Kyle

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 30.12.2014
    Published in arXiv.org (30.12.2014)
    “… We list the main features of Jif and discuss the information flow problem that Jif helps to solve…”
    Get full text
    Paper
  4. 4

    Towards Language-Based Mitigation of Traffic Analysis Attacks by Blaabjerg, Jeppe Fredsgaard, Askarov, Aslan

    ISSN: 2374-8303
    Published: IEEE 01.06.2021
    “… them, and the problem has received little attention in the language-based information flow literature…”
    Get full text
    Conference Proceeding
  5. 5

    Instruction-level security analysis for information flow in stack-based assembly languages by De Francesco, Nicoletta, Martini, Luca

    ISSN: 0890-5401, 1090-2651
    Published: San Diego, CA Elsevier Inc 01.09.2007
    Published in Information and computation (01.09.2007)
    “…We propose a method to analyze secure information flow in stack-based assembly languages, communicating with the external environment by means of input and output channels…”
    Get full text
    Journal Article
  6. 6

    QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment by Guo, Xiaolong, Dutta, Raj Gautam, He, Jiaji, Tehranipoor, Mark M., Jin, Yier

    Published: IEEE 01.05.2019
    “… As a result, various security solutions have been developed to protect ICs, among which the language-based hardware security verification serves as a promising solution…”
    Get full text
    Conference Proceeding
  7. 7

    A scalable entropy estimator by Golia, Priyanka, Juba, Brendan, Meel, Kuldeep S.

    ISSN: 0925-9856, 1572-8102
    Published: New York Springer US 01.08.2025
    Published in Formal methods in system design (01.08.2025)
    “…) in programming-language-based security. Here, information-theoretic quantities capture the effort required on the part of an adversary to obtain access to confidential…”
    Get full text
    Journal Article
  8. 8

    Nontransitive Security Types for Coarse-grained Information Flow Control by Lu, Yi, Zhang, Chenyi

    ISSN: 2374-8303
    Published: IEEE 01.06.2020
    “…Language-based information flow control (IFC) aims to provide guarantees about information propagation in computer systems having multiple security levels…”
    Get full text
    Conference Proceeding
  9. 9

    A monadic analysis of information flow security with mutable state by CRARY, KARL, KLIGER, ALEKSEY, PFENNING, FRANK

    ISSN: 0956-7968, 1469-7653
    Published: Cambridge, UK Cambridge University Press 01.03.2005
    Published in Journal of functional programming (01.03.2005)
    “… Our analysis is based on a logic of information flow derived from lax logic and the monadic metalanguage…”
    Get full text
    Journal Article
  10. 10

    Security types preserving compilation by Barthe, Gilles, Rezk, Tamara, Basu, Amitabh

    ISSN: 1477-8424, 1873-6866
    Published: Elsevier Ltd 01.07.2007
    Published in Computer languages, systems & structures (01.07.2007)
    “…” (Sabelfeld and Myers, [Language-based information-flow security. IEEE Journal on Selected Areas in Communications 2003; 21:5–19…”
    Get full text
    Journal Article
  11. 11

    Securing Class Initialization in Java-like Languages by Rafnsson, W., Nakata, K., Sabelfeld, A.

    ISSN: 1545-5971, 1941-0018, 1941-0018
    Published: Washington IEEE 01.01.2013
    “…Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs…”
    Get full text
    Journal Article
  12. 12

    Towards Language-Based Mitigation of Traffic Analysis Attacks by Jeppe Fredsgaard Blaabjerg, Aslan Askarov

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 24.06.2021
    Published in arXiv.org (24.06.2021)
    “… them, and the problem has received little attention in the language-based information flow literature…”
    Get full text
    Paper
  13. 13

    Compositional Security for Reentrant Applications by Cecchetti, Ethan, Yao, Siqiu, Ni, Haobin, Myers, Andrew C.

    ISSN: 2375-1207
    Published: IEEE 01.05.2021
    “… power of safe forms of reentrancy. We present a security type system that provably enforces secure information flow…”
    Get full text
    Conference Proceeding
  14. 14

    A Field-Sensitive Security Monitor for Object-Oriented Programs by Khakpour, Narges

    ISSN: 0167-4048, 1872-6208, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.09.2021
    Published in Computers & security (01.09.2021)
    “… flow violations and applies suitable countermeasures to prevent violations. We introduce an approach for modeling heap and information flow via heap…”
    Get full text
    Journal Article
  15. 15

    Information Flow Control for Distributed Trusted Execution Environments by Gollamudi, Anitha, Chong, Stephen, Arden, Owen

    ISSN: 2374-8303
    Published: IEEE 01.06.2019
    “…Distributed applications cannot assume that their security policies will be enforced on untrusted hosts…”
    Get full text
    Conference Proceeding
  16. 16

    SoK: Shining Light on Shadow Stacks by Burow, Nathan, Zhang, Xinping, Payer, Mathias

    ISSN: 2375-1207
    Published: IEEE 01.05.2019
    “…Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity…”
    Get full text
    Conference Proceeding
  17. 17

    Information Flow Control for Serverless Systems by Chawla, Rishabh

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2021
    “…Security for Serverless Systems is looked at from two perspectives, the server-level security managed by the infras-tructure company and the Application level Security managed…”
    Get full text
    Journal Article
  18. 18

    IFCIL: An Information Flow Configuration Language for SELinux by Ceragioli, Lorenzo, Galletta, Letterio, Degano, Pierpaolo, Basin, David

    Published: IEEE 01.08.2022
    “… However, CIL lacks mechanisms for ensuring that the resulting configurations obey desired information flow policies…”
    Get full text
    Conference Proceeding
  19. 19

    Secure information sharing in social agent interactions using information flow analysis by Bijani, Shahriar, Robertson, David, Aspinall, David

    ISSN: 0952-1976, 1873-6769
    Published: Elsevier Ltd 01.04.2018
    “…), a compact executable specification language based on logic programming and pi-calculus. Open multi-agent systems have experienced growing popularity in the multi-agent…”
    Get full text
    Journal Article
  20. 20

    Integrating Information Flow Analysis in Unifying Theories of Programming by Mu, Chunyan, Li, Guoqiang

    ISSN: 2473-3105
    Published: IEEE 01.12.2021
    “…This paper presents a formal approach for modelling and reasoning about information flow control in software systems under Hoare and He's Unifying Theories of Programming (UTP…”
    Get full text
    Conference Proceeding