Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Pivot tracing: Dynamic causal monitoring for distributed systems
Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …
Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
Recognising spontaneous facial micro-expressions
Facial micro-expressions are rapid involuntary facial expressions which reveal suppressed
affect. To the best knowledge of the authors, there is no previous work that successfully …
affect. To the best knowledge of the authors, there is no previous work that successfully …
JFlow: Practical mostly-static information flow control
AC Myers - Proceedings of the 26th ACM SIGPLAN-SIGACT …, 1999 - dl.acm.org
A promising technique for protecting privacy and integrity of sensitive data is to statically
check information flow within programs that manipulate the data. While previous work has …
check information flow within programs that manipulate the data. While previous work has …
[PDF][PDF] Airavat: Security and privacy for MapReduce.
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from
untrusted methods and parameters may flow into security-sensitive operations. Taint …
untrusted methods and parameters may flow into security-sensitive operations. Taint …
[PDF][PDF] Quire: Lightweight provenance for smart phone operating systems
Smartphone apps are often granted to privilege to run with access to the network and
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
The computer systems security arms race between attackers and defenders has largely
taken place in the domain of software systems, but as hardware complexity and design …
taken place in the domain of software systems, but as hardware complexity and design …