Designing information flow policies for Android's operating system
R Andriatsimandefitra, S Geller… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
A mobile phone evolves as a data repository where the pieces of data have different owners
and may thus be protected by different security policies. These pieces of data are used on …
and may thus be protected by different security policies. These pieces of data are used on …
Intrusion detection in distributed systems, an approach based on taint marking
This paper presents a new framework for distributed intrusion detection based on taint
marking. Our system tracks information flows between applications of multiple hosts …
marking. Our system tracks information flows between applications of multiple hosts …
A taint marking approach to confidentiality violation detection
This article presents a novel approach to confidentiality violation detection based on taint
marking. Information flows are dynamically tracked between applications and objects of the …
marking. Information flows are dynamically tracked between applications and objects of the …
Flow based interpretation of access control: Detection of illegal information flows
In this paper, we introduce a formal property characterizing access control policies for which
the interpretations of access control as mechanism over objects and as mechanism over …
the interpretations of access control as mechanism over objects and as mechanism over …
Semantic comparison of security policies: from access control policies to flow properties
M Jaume - 2012 IEEE Symposium on Security and Privacy …, 2012 - ieeexplore.ieee.org
This paper introduces two generic mechanisms allowing to compare security policies from a
semantical point of view. First, a notion of embedding is defined in order to compare policies …
semantical point of view. First, a notion of embedding is defined in order to compare policies …
Information Flow Policies vs Malware-Final Battle-.
R Andriatsimandefitra, T Saliou… - Journal of Information …, 2014 - search.ebscohost.com
Application markets offer more than 700'000 applications: music, movies, games or small
tools. It appears more and more difficult to propose an automatic and systematic method to …
tools. It appears more and more difficult to propose an automatic and systematic method to …
Information flow policies vs malware
R Andriatsimandefitra, T Saliou… - 2013 9th International …, 2013 - ieeexplore.ieee.org
Application markets offer more than 700'000 applications: music, movies, games or small
tools. It appears more and more difficult to propose an automatic and systematic method to …
tools. It appears more and more difficult to propose an automatic and systematic method to …
[PDF][PDF] Bspl: A language to specify and compose fine-grained information flow policies
We tackle the problem of operating systems security. The seriousness of the vulnerabilities
in today's software underlines the importance of using a monitor at the operating system …
in today's software underlines the importance of using a monitor at the operating system …
Secure States versus Secure Executions: From Access Control to Flow Control
M Jaume, R Andriatsimandefitra, VVT Tong… - … Systems Security: 9th …, 2013 - Springer
Several points of view exist about security policies among which two main approaches can
be distinguished: policies can be defined by some properties over states of a system or by …
be distinguished: policies can be defined by some properties over states of a system or by …
A basis for intrusion detection in distributed systems using kernel-level data tainting.
C Hauser - 2013 - theses.hal.science
Modern organisations rely intensively on information and communicationtechnology
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …