Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Pivot tracing: Dynamic causal monitoring for distributed systems

J Mace, R Roelke, R Fonseca - ACM Transactions on Computer Systems …, 2018 - dl.acm.org
Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

Recognising spontaneous facial micro-expressions

T Pfister, X Li, G Zhao… - … conference on computer …, 2011 - ieeexplore.ieee.org
Facial micro-expressions are rapid involuntary facial expressions which reveal suppressed
affect. To the best knowledge of the authors, there is no previous work that successfully …

JFlow: Practical mostly-static information flow control

AC Myers - Proceedings of the 26th ACM SIGPLAN-SIGACT …, 1999 - dl.acm.org
A promising technique for protecting privacy and integrity of sensitive data is to statically
check information flow within programs that manipulate the data. While previous work has …

[PDF][PDF] Airavat: Security and privacy for MapReduce.

I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel - NSDI, 2010 - usenix.org
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …

TAJ: effective taint analysis of web applications

O Tripp, M Pistoia, SJ Fink, M Sridharan… - ACM Sigplan …, 2009 - dl.acm.org
Taint analysis, a form of information-flow analysis, establishes whether values from
untrusted methods and parameters may flow into security-sensitive operations. Taint …

[PDF][PDF] Quire: Lightweight provenance for smart phone operating systems

M Dietz, S Shekhar, Y Pisetsky, A Shu… - USENIX security …, 2011 - usenix.org
Smartphone apps are often granted to privilege to run with access to the network and
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …

Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically

M Hicks, M Finnicum, ST King… - … IEEE symposium on …, 2010 - ieeexplore.ieee.org
The computer systems security arms race between attackers and defenders has largely
taken place in the domain of software systems, but as hardware complexity and design …