A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Tight enforcement of information-release policies for dynamic languages

A Askarov, A Sabelfeld - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
This paper studies the problem of securing information release in dynamic languages. We
propose (i) an intuitive framework for information-release policies expressing both what can …

Runtime verification of k-safety hyperproperties in HyperLTL

S Agrawal, B Bonakdarpour - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
This paper introduces a novel runtime verification technique for a rich sub-class of Clarkson
and Schneider's hyperproperties. The primary application of such properties is in expressing …

Reactive noninterference

A Bohannon, BC Pierce, V Sjöberg, S Weirich… - Proceedings of the 16th …, 2009 - dl.acm.org
Many programs operate reactively--patiently waiting for user input, running for a while
producing output, and eventually returning to a state where they are ready to accept another …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Monitoring hyperproperties by combining static analysis and runtime verification

B Bonakdarpour, C Sánchez, G Schneider - … 5-9, 2018, Proceedings, Part II …, 2018 - Springer
Hyperproperties are properties whose reasoning involve sets of traces. Examples of
hyperproperties include information-flow security properties, properties of coding/decoding …

Explicit secrecy: A policy for taint tracking

D Schoepe, M Balliu, BC Pierce… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in
high-level languages and at the machine code level. But despite the many taint trackers in …

Secure multi-execution: Fine-grained, declassification-aware, and transparent

W Rafnsson, A Sabelfeld - Journal of Computer Security, 2016 - content.iospress.com
Recently, much progress has been made on achieving information-flow security via secure
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …

Rewriting-based runtime verification for alternation-free HyperLTL

N Brett, U Siddique, B Bonakdarpour - … for the Construction and Analysis of …, 2017 - Springer
Abstract Analysis of complex security and privacy policies (eg, information flow) involves
reasoning about multiple execution traces. This stems from the fact that an external observer …

Learning is change in knowledge: Knowledge-based security for dynamic policies

A Askarov, S Chong - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
In systems that handle confidential information, the security policy to enforce on information
frequently changes: new users join the system, old users leave, and sensitivity of data …