Designing information flow policies for Android's operating system

R Andriatsimandefitra, S Geller… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
A mobile phone evolves as a data repository where the pieces of data have different owners
and may thus be protected by different security policies. These pieces of data are used on …

Intrusion detection in distributed systems, an approach based on taint marking

C Hauser, F Tronel, C Fidge… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
This paper presents a new framework for distributed intrusion detection based on taint
marking. Our system tracks information flows between applications of multiple hosts …

A taint marking approach to confidentiality violation detection

C Hauser, F Tronel, J Reid… - Information Security 2012 …, 2012 - eprints.qut.edu.au
This article presents a novel approach to confidentiality violation detection based on taint
marking. Information flows are dynamically tracked between applications and objects of the …

Flow based interpretation of access control: Detection of illegal information flows

M Jaume, V Viet Triem Tong, L Mé - … 2011, Kolkata, India, December 15-19 …, 2011 - Springer
In this paper, we introduce a formal property characterizing access control policies for which
the interpretations of access control as mechanism over objects and as mechanism over …

Semantic comparison of security policies: from access control policies to flow properties

M Jaume - 2012 IEEE Symposium on Security and Privacy …, 2012 - ieeexplore.ieee.org
This paper introduces two generic mechanisms allowing to compare security policies from a
semantical point of view. First, a notion of embedding is defined in order to compare policies …

Information Flow Policies vs Malware-Final Battle-.

R Andriatsimandefitra, T Saliou… - Journal of Information …, 2014 - search.ebscohost.com
Application markets offer more than 700'000 applications: music, movies, games or small
tools. It appears more and more difficult to propose an automatic and systematic method to …

Information flow policies vs malware

R Andriatsimandefitra, T Saliou… - 2013 9th International …, 2013 - ieeexplore.ieee.org
Application markets offer more than 700'000 applications: music, movies, games or small
tools. It appears more and more difficult to propose an automatic and systematic method to …

[PDF][PDF] Bspl: A language to specify and compose fine-grained information flow policies

S Geller, VVT Tong, L Mé - Proceedings of the The Seventh …, 2013 - personales.upv.es
We tackle the problem of operating systems security. The seriousness of the vulnerabilities
in today's software underlines the importance of using a monitor at the operating system …

Secure States versus Secure Executions: From Access Control to Flow Control

M Jaume, R Andriatsimandefitra, VVT Tong… - … Systems Security: 9th …, 2013 - Springer
Several points of view exist about security policies among which two main approaches can
be distinguished: policies can be defined by some properties over states of a system or by …

A basis for intrusion detection in distributed systems using kernel-level data tainting.

C Hauser - 2013 - theses.hal.science
Modern organisations rely intensively on information and communicationtechnology
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …