A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …
Tight enforcement of information-release policies for dynamic languages
This paper studies the problem of securing information release in dynamic languages. We
propose (i) an intuitive framework for information-release policies expressing both what can …
propose (i) an intuitive framework for information-release policies expressing both what can …
Runtime verification of k-safety hyperproperties in HyperLTL
This paper introduces a novel runtime verification technique for a rich sub-class of Clarkson
and Schneider's hyperproperties. The primary application of such properties is in expressing …
and Schneider's hyperproperties. The primary application of such properties is in expressing …
Reactive noninterference
Many programs operate reactively--patiently waiting for user input, running for a while
producing output, and eventually returning to a state where they are ready to accept another …
producing output, and eventually returning to a state where they are ready to accept another …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Monitoring hyperproperties by combining static analysis and runtime verification
Hyperproperties are properties whose reasoning involve sets of traces. Examples of
hyperproperties include information-flow security properties, properties of coding/decoding …
hyperproperties include information-flow security properties, properties of coding/decoding …
Explicit secrecy: A policy for taint tracking
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in
high-level languages and at the machine code level. But despite the many taint trackers in …
high-level languages and at the machine code level. But despite the many taint trackers in …
Secure multi-execution: Fine-grained, declassification-aware, and transparent
Recently, much progress has been made on achieving information-flow security via secure
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …
Rewriting-based runtime verification for alternation-free HyperLTL
Abstract Analysis of complex security and privacy policies (eg, information flow) involves
reasoning about multiple execution traces. This stems from the fact that an external observer …
reasoning about multiple execution traces. This stems from the fact that an external observer …
Learning is change in knowledge: Knowledge-based security for dynamic policies
In systems that handle confidential information, the security policy to enforce on information
frequently changes: new users join the system, old users leave, and sensitivity of data …
frequently changes: new users join the system, old users leave, and sensitivity of data …