Flexible dynamic information flow control in Haskell
We describe a new, dynamic, floating-label approach to language-based information flow
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …
A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …
HLIO: Mixing static and dynamic ty** for information-flow control in Haskell
Information-Flow Control (IFC) is a well-established approach for allowing untrusted code to
manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and …
manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and …
A library for light-weight information-flow security in Haskell
Protecting confidentiality of data has become increasingly important for computing systems.
Information-flow techniques have been developed over the years to achieve that purpose …
Information-flow techniques have been developed over the years to achieve that purpose …
Nickel: A framework for design and verification of information flow control systems
H Sigurbjarnarson, L Nelson, B Castro-Karney… - … USENIX Symposium on …, 2018 - usenix.org
Nickel is a framework that helps developers design and verify information flow control
systems by systematically eliminating covert channels inherent in the interface, which can be …
systems by systematically eliminating covert channels inherent in the interface, which can be …
Assumptions and guarantees for compositional noninterference
The idea of building secure systems by plugging together" secure''components is appealing,
but this requires a definition of security which, in addition to taking care of top-level security …
but this requires a definition of security which, in addition to taking care of top-level security …
Eliminating cache-based timing attacks with instruction-based scheduling
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …
information without leaking this information. However, the presence of covert channels …
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may
be leaked by terminating accordingly. While this termination covert channel has limited …
be leaked by terminating accordingly. While this termination covert channel has limited …
Functional pearl: two can keep a secret, if one of them uses Haskell
A Russo - ACM SIGPLAN Notices, 2015 - dl.acm.org
For several decades, researchers from different communities have independently focused
on protecting confidentiality of data. Two distinct technologies have emerged for such …
on protecting confidentiality of data. Two distinct technologies have emerged for such …
Safe haskell
Though Haskell is predominantly type-safe, implementations contain a few loopholes
through which code can bypass ty** and module encapsulation. This paper presents Safe …
through which code can bypass ty** and module encapsulation. This paper presents Safe …