Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Verifying hyperproperties with TLA

L Lamport, FB Schneider - 2021 IEEE 34th Computer Security …, 2021 - ieeexplore.ieee.org
Hyperproperties generalize ordinary properties by expressing relations among multiple
executions of a system. Self–composition has been used to reduce verifying that a system …

Information-flow control for database-backed applications

M Guarnieri, M Balliu, D Schoepe… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Securing database-backed applications requires tracking information across the application
program and the database together, since securing each component in isolation may still …

The anatomy and facets of dynamic policies

N Broberg, B van Delft, D Sands - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Information flow policies are often dynamic, the security concerns of a program will typically
change during execution to reflect security-relevant events. A key challenge is how to best …

Tainted Secure Multi-Execution to Restrict Attacker Influence

MK McCall, A Bichhawat, L Jia - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …

Compositional information flow monitoring for reactive programs

MK McCall, A Bichhawat, L Jia - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
To prevent applications from leaking users' private data to attackers, researchers have
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …

Dynamic policies revisited

AM Ahmadian, M Balliu - 2022 IEEE 7th European Symposium …, 2022 - ieeexplore.ieee.org
Information flow control and dynamic policies is a difficult relationship yet to be fully
understood. While dynamic policies are a natural choice in many real-world applications that …

[HTML][HTML] Formalising privacy policies in social networks

R Pardo, M Balliu, G Schneider - Journal of Logical and Algebraic Methods …, 2017 - Elsevier
Abstract Social Network Services (SNS) have changed the way people communicate,
bringing many benefits but also new concerns. Privacy is one of them. We present a …

Knowledge-based security of dynamic secrets for reactive programs

MK McCall, H Zhang, L Jia - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
Scripts on webpages could steal sensitive user data. Much work has been done, both in
modeling and implementation, to enforce information flow control (IFC) of webpages to …

Security properties through the lens of modal logic

M Soloviev, M Balliu… - 2024 IEEE 37th Computer …, 2024 - ieeexplore.ieee.org
We introduce a framework for reasoning about the security of computer systems using modal
logic. This framework is sufficiently expressive to capture a variety of known security …