Flexible dynamic information flow control in Haskell

D Stefan, A Russo, JC Mitchell… - Proceedings of the 4th …, 2011 - dl.acm.org
We describe a new, dynamic, floating-label approach to language-based information flow
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

HLIO: Mixing static and dynamic ty** for information-flow control in Haskell

P Buiras, D Vytiniotis, A Russo - Proceedings of the 20th ACM SIGPLAN …, 2015 - dl.acm.org
Information-Flow Control (IFC) is a well-established approach for allowing untrusted code to
manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and …

A library for light-weight information-flow security in Haskell

A Russo, K Claessen, J Hughes - ACM Sigplan Notices, 2008 - dl.acm.org
Protecting confidentiality of data has become increasingly important for computing systems.
Information-flow techniques have been developed over the years to achieve that purpose …

Nickel: A framework for design and verification of information flow control systems

H Sigurbjarnarson, L Nelson, B Castro-Karney… - … USENIX Symposium on …, 2018 - usenix.org
Nickel is a framework that helps developers design and verify information flow control
systems by systematically eliminating covert channels inherent in the interface, which can be …

Assumptions and guarantees for compositional noninterference

H Mantel, D Sands, H Sudbrock - 2011 IEEE 24th Computer …, 2011 - ieeexplore.ieee.org
The idea of building secure systems by plugging together" secure''components is appealing,
but this requires a definition of security which, in addition to taking care of top-level security …

Eliminating cache-based timing attacks with instruction-based scheduling

D Stefan, P Buiras, EZ Yang, A Levy, D Terei… - … –ESORICS 2013: 18th …, 2013 - Springer
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …

Addressing covert termination and timing channels in concurrent information flow systems

D Stefan, A Russo, P Buiras, A Levy, JC Mitchell… - ACM SIGPLAN …, 2012 - dl.acm.org
When termination of a program is observable by an adversary, confidential information may
be leaked by terminating accordingly. While this termination covert channel has limited …

Functional pearl: two can keep a secret, if one of them uses Haskell

A Russo - ACM SIGPLAN Notices, 2015 - dl.acm.org
For several decades, researchers from different communities have independently focused
on protecting confidentiality of data. Two distinct technologies have emerged for such …

Safe haskell

D Terei, S Marlow, S Peyton Jones… - Proceedings of the 2012 …, 2012 - dl.acm.org
Though Haskell is predominantly type-safe, implementations contain a few loopholes
through which code can bypass ty** and module encapsulation. This paper presents Safe …