Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
COVERN: A logic for compositional verification of information flow control
Shared memory concurrency is pervasive in modern programming, including in systems that
must protect highly sensitive data. Recently, verification has finally emerged as a practical …
must protect highly sensitive data. Recently, verification has finally emerged as a practical …
Verifying security policies in multi-agent workflows with loops
We consider the automatic verification of information flow security policies of web-based
workflows, such as conference submission systems like EasyChair. Our workflow description …
workflows, such as conference submission systems like EasyChair. Our workflow description …
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications
We consider the problem of specifying and proving the security of non-trivial, concurrent
programs that intentionally leak information. We present a method that decomposes the …
programs that intentionally leak information. We present a method that decomposes the …
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations
Relational properties describe multiple runs of one or more programs. They characterize
many useful notions of security, program refinement, and equivalence for programs with …
many useful notions of security, program refinement, and equivalence for programs with …
VERONICA: expressive and precise concurrent information flow security
Methods for proving that concurrent software does not leak its secrets has remained an
active topic of research for at least the past four decades. Despite an impressive array of …
active topic of research for at least the past four decades. Despite an impressive array of …
BP: Formal proofs, the fine print and side effects
Given recent high-profile successes in formal verification of security-related properties (eg,
for seL4), and the rising popularity of applying formal methods to cryptographic libraries and …
for seL4), and the rising popularity of applying formal methods to cryptographic libraries and …
De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation
YB Gurav, BM Patil - International journal of intelligent robotics and …, 2023 - Springer
Cloud computing is now used by many enterprises due to its increased computational
efficiency, economic effectiveness, as well as flexibility. However, security is currently the …
efficiency, economic effectiveness, as well as flexibility. However, security is currently the …
Certified password quality: a case study using Coq and Linux pluggable authentication modules
We propose the use of modern proof assistants to specify, implement, and verify password
quality checkers. We use the proof assistant Coq, focusing on Linux PAM, a widely-used …
quality checkers. We use the proof assistant Coq, focusing on Linux PAM, a widely-used …
CoSMed: A confidentiality-verified social media platform
T Bauereiss, A Pesenti Gritti, A Popescu… - Journal of Automated …, 2018 - Springer
This paper describes progress with our agenda of formal verification of information flow
security for realistic systems. We present CoSMed, a social media platform with verified …
security for realistic systems. We present CoSMed, a social media platform with verified …
Inductive invariants for noninterference in multi-agent workflows
Our goal is to certify absence of information leaks in multi-agent workflows, such as
conference management systems like EasyChair. These workflows can be executed by any …
conference management systems like EasyChair. These workflows can be executed by any …