Hyperproperties
Trace properties, which have long been used for reasoning about systems, are sets of
execution traces. Hyperproperties, introduced here, are sets of trace properties …
execution traces. Hyperproperties, introduced here, are sets of trace properties …
Temporal logics for hyperproperties
Two new logics for verification of hyperproperties are proposed. Hyperproperties
characterize security policies, such as noninterference, as a property of sets of computation …
characterize security policies, such as noninterference, as a property of sets of computation …
A hardware design language for timing-sensitive information-flow security
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …
recently prominent example is cache probing attacks, which rely on timing channels created …
Secure information flow by self-composition
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …
program execution. A common way to enforce secure information flow is through information …
Remote timing attacks are still practical
For over two decades, timing attacks have been an active area of research within applied
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …
A formal approach to secure speculation
Transient execution attacks like Spectre, Meltdown and Foreshadow have shown that
combinations of microarchitectural side-channels can be synergistically exploited to create …
combinations of microarchitectural side-channels can be synergistically exploited to create …
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of
events is wrapped by a timing mitigator that delays output events so that they contain only a …
events is wrapped by a timing mitigator that delays output events so that they contain only a …
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this
language, well-typed programs provably leak only a bounded amount of information over …
language, well-typed programs provably leak only a bounded amount of information over …
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground
up, including at hardware design time, to provide a formal basis for a system's root of trust …
up, including at hardware design time, to provide a formal basis for a system's root of trust …
Verification of a practical hardware security architecture through static information flow analysis
Hardware-based mechanisms for software isolation are becoming increasingly popular, but
implementing these mechanisms correctly has proved difficult, undermining the root of …
implementing these mechanisms correctly has proved difficult, undermining the root of …