Search Results - Language-based Information Flow Security
-
1
Language-based information-flow security
ISSN: 0733-8716, 1558-0008Published: New York IEEE 01.01.2003Published in IEEE journal on selected areas in communications (01.01.2003)“…; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies…”
Get full text
Journal Article -
2
On-the-fly inlining of dynamic security monitors
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.10.2012Published in Computers & security (01.10.2012)“…? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels…”
Get full text
Journal Article -
3
Jif: Language-based Information-flow Security in Java
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 30.12.2014Published in arXiv.org (30.12.2014)“… We list the main features of Jif and discuss the information flow problem that Jif helps to solve…”
Get full text
Paper -
4
Towards Language-Based Mitigation of Traffic Analysis Attacks
ISSN: 2374-8303Published: IEEE 01.06.2021Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.06.2021)“… them, and the problem has received little attention in the language-based information flow literature…”
Get full text
Conference Proceeding -
5
Instruction-level security analysis for information flow in stack-based assembly languages
ISSN: 0890-5401, 1090-2651Published: San Diego, CA Elsevier Inc 01.09.2007Published in Information and computation (01.09.2007)“…We propose a method to analyze secure information flow in stack-based assembly languages, communicating with the external environment by means of input and output channels…”
Get full text
Journal Article -
6
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Published: IEEE 01.05.2019Published in 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01.05.2019)“… As a result, various security solutions have been developed to protect ICs, among which the language-based hardware security verification serves as a promising solution…”
Get full text
Conference Proceeding -
7
A scalable entropy estimator
ISSN: 0925-9856, 1572-8102Published: New York Springer US 01.08.2025Published in Formal methods in system design (01.08.2025)“…) in programming-language-based security. Here, information-theoretic quantities capture the effort required on the part of an adversary to obtain access to confidential…”
Get full text
Journal Article -
8
Nontransitive Security Types for Coarse-grained Information Flow Control
ISSN: 2374-8303Published: IEEE 01.06.2020Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.06.2020)“…Language-based information flow control (IFC) aims to provide guarantees about information propagation in computer systems having multiple security levels…”
Get full text
Conference Proceeding -
9
A monadic analysis of information flow security with mutable state
ISSN: 0956-7968, 1469-7653Published: Cambridge, UK Cambridge University Press 01.03.2005Published in Journal of functional programming (01.03.2005)“… Our analysis is based on a logic of information flow derived from lax logic and the monadic metalanguage…”
Get full text
Journal Article -
10
Security types preserving compilation
ISSN: 1477-8424, 1873-6866Published: Elsevier Ltd 01.07.2007Published in Computer languages, systems & structures (01.07.2007)“…” (Sabelfeld and Myers, [Language-based information-flow security. IEEE Journal on Selected Areas in Communications 2003; 21:5–19…”
Get full text
Journal Article -
11
Securing Class Initialization in Java-like Languages
ISSN: 1545-5971, 1941-0018, 1941-0018Published: Washington IEEE 01.01.2013Published in IEEE transactions on dependable and secure computing (01.01.2013)“…Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs…”
Get full text
Journal Article -
12
Towards Language-Based Mitigation of Traffic Analysis Attacks
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 24.06.2021Published in arXiv.org (24.06.2021)“… them, and the problem has received little attention in the language-based information flow literature…”
Get full text
Paper -
13
Compositional Security for Reentrant Applications
ISSN: 2375-1207Published: IEEE 01.05.2021Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2021)“… power of safe forms of reentrancy. We present a security type system that provably enforces secure information flow…”
Get full text
Conference Proceeding -
14
A Field-Sensitive Security Monitor for Object-Oriented Programs
ISSN: 0167-4048, 1872-6208, 1872-6208Published: Amsterdam Elsevier Ltd 01.09.2021Published in Computers & security (01.09.2021)“… flow violations and applies suitable countermeasures to prevent violations. We introduce an approach for modeling heap and information flow via heap…”
Get full text
Journal Article -
15
Information Flow Control for Distributed Trusted Execution Environments
ISSN: 2374-8303Published: IEEE 01.06.2019Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.06.2019)“…Distributed applications cannot assume that their security policies will be enforced on untrusted hosts…”
Get full text
Conference Proceeding -
16
SoK: Shining Light on Shadow Stacks
ISSN: 2375-1207Published: IEEE 01.05.2019Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)“…Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity…”
Get full text
Conference Proceeding -
17
Information Flow Control for Serverless Systems
ISSN: 2158-107X, 2156-5570Published: West Yorkshire Science and Information (SAI) Organization Limited 2021Published in International journal of advanced computer science & applications (2021)“…Security for Serverless Systems is looked at from two perspectives, the server-level security managed by the infras-tructure company and the Application level Security managed…”
Get full text
Journal Article -
18
IFCIL: An Information Flow Configuration Language for SELinux
Published: IEEE 01.08.2022Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)“… However, CIL lacks mechanisms for ensuring that the resulting configurations obey desired information flow policies…”
Get full text
Conference Proceeding -
19
Secure information sharing in social agent interactions using information flow analysis
ISSN: 0952-1976, 1873-6769Published: Elsevier Ltd 01.04.2018Published in Engineering applications of artificial intelligence (01.04.2018)“…), a compact executable specification language based on logic programming and pi-calculus. Open multi-agent systems have experienced growing popularity in the multi-agent…”
Get full text
Journal Article -
20
Integrating Information Flow Analysis in Unifying Theories of Programming
ISSN: 2473-3105Published: IEEE 01.12.2021Published in Proceedings (IEEE Pacific Rim International Symposium on Dependable Computing) (01.12.2021)“…This paper presents a formal approach for modelling and reasoning about information flow control in software systems under Hoare and He's Unifying Theories of Programming (UTP…”
Get full text
Conference Proceeding