Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A hardware design language for timing-sensitive information-flow security
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …
recently prominent example is cache probing attacks, which rely on timing channels created …
Secure information flow by self-composition
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …
program execution. A common way to enforce secure information flow is through information …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …
security problems, including cross-site scripting attacks and malicious advertising code …
Dynamic vs. static flow-sensitive security analysis
This paper seeks to answer fundamental questions about trade-offs between static and
dynamic security analysis. It has been previously shown that flow-sensitive static information …
dynamic security analysis. It has been previously shown that flow-sensitive static information …
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
Abstract Information flow control (IFC) checks whether a program can leak secret data to
public ports, or whether critical computations can be influenced from outside. But many IFC …
public ports, or whether critical computations can be influenced from outside. But many IFC …
A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …
Flexible dynamic information flow control in Haskell
We describe a new, dynamic, floating-label approach to language-based information flow
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …
A static analysis for quantifying information flow in a simple imperative language
We propose an approach to quantify interference in a simple imperative language that
includes a loo** construct. In this paper we focus on a particular case of this definition of …
includes a loo** construct. In this paper we focus on a particular case of this definition of …
Permissive dynamic information flow analysis
A key challenge in dynamic information flow analysis is handling implicit flows, where code
conditional on a private variable updates a public variable x. The naive approach of …
conditional on a private variable updates a public variable x. The naive approach of …