Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Verifying hyperproperties with TLA
L Lamport, FB Schneider - 2021 IEEE 34th Computer Security …, 2021 - ieeexplore.ieee.org
Hyperproperties generalize ordinary properties by expressing relations among multiple
executions of a system. Self–composition has been used to reduce verifying that a system …
executions of a system. Self–composition has been used to reduce verifying that a system …
Information-flow control for database-backed applications
Securing database-backed applications requires tracking information across the application
program and the database together, since securing each component in isolation may still …
program and the database together, since securing each component in isolation may still …
The anatomy and facets of dynamic policies
Information flow policies are often dynamic, the security concerns of a program will typically
change during execution to reflect security-relevant events. A key challenge is how to best …
change during execution to reflect security-relevant events. A key challenge is how to best …
Tainted Secure Multi-Execution to Restrict Attacker Influence
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …
work shows that secure multi-execution (SME) with declassification is useful for mitigating …
Compositional information flow monitoring for reactive programs
To prevent applications from leaking users' private data to attackers, researchers have
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …
Dynamic policies revisited
Information flow control and dynamic policies is a difficult relationship yet to be fully
understood. While dynamic policies are a natural choice in many real-world applications that …
understood. While dynamic policies are a natural choice in many real-world applications that …
[HTML][HTML] Formalising privacy policies in social networks
Abstract Social Network Services (SNS) have changed the way people communicate,
bringing many benefits but also new concerns. Privacy is one of them. We present a …
bringing many benefits but also new concerns. Privacy is one of them. We present a …
Knowledge-based security of dynamic secrets for reactive programs
Scripts on webpages could steal sensitive user data. Much work has been done, both in
modeling and implementation, to enforce information flow control (IFC) of webpages to …
modeling and implementation, to enforce information flow control (IFC) of webpages to …
Security properties through the lens of modal logic
We introduce a framework for reasoning about the security of computer systems using modal
logic. This framework is sufficiently expressive to capture a variety of known security …
logic. This framework is sufficiently expressive to capture a variety of known security …