Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Using bypass to tighten WCET estimates for multi-core processors with shared instruction caches
Multi-core chips have been increasingly adopted by the microprocessor industry. For real-
time systems to exploit multi-core architectures, it is required to obtain both tight and safe …
time systems to exploit multi-core architectures, it is required to obtain both tight and safe …
Compositional verification and refinement of concurrent value-dependent noninterference
Value-dependent noninterference allows the classification of program variables to depend
on the contents of other variables, and therefore is able to express a range of data …
on the contents of other variables, and therefore is able to express a range of data …
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications
We consider the problem of specifying and proving the security of non-trivial, concurrent
programs that intentionally leak information. We present a method that decomposes the …
programs that intentionally leak information. We present a method that decomposes the …
Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels
Recent research in privacy-preserving systems relies on state-of-the-art defenses to close
the termination timing channel. In this paper, we challenge the effectiveness of the adopted …
the termination timing channel. In this paper, we challenge the effectiveness of the adopted …
[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …
timing channels that may leak sensitive information. In this paper, we present a …
Backwards-directed information flow analysis for concurrent programs
A number of approaches have been developed for analysing information flow in concurrent
programs in a compositional manner, ie, in terms of one thread at a time. Early approaches …
programs in a compositional manner, ie, in terms of one thread at a time. Early approaches …
Towards a flow-and path-sensitive information flow analysis
P Li, D Zhang - 2017 IEEE 30th Computer Security Foundations …, 2017 - ieeexplore.ieee.org
This paper investigates a flow-and path-sensitive static information flow analysis. Compared
with security type systems with fixed labels, it has been shown that flow-sensitive type …
with security type systems with fixed labels, it has been shown that flow-sensitive type …
Timing-sensitive noninterference through composition
Sound compositional reasoning principles are the foundation for analyzing the security
properties of complex systems. We present a general theory for compositional reasoning …
properties of complex systems. We present a general theory for compositional reasoning …
Modular verification of information flow security in component-based systems
We propose a novel method for the verification of information flow security in component-
based systems. The method is (a) modular wrt services and components, ie, overall security …
based systems. The method is (a) modular wrt services and components, ie, overall security …
Gradual security types and gradual guarantees
Information flow type systems enforce the security property of noninterference by detecting
unauthorized data flows at compile-time. However, they require precise type annotations …
unauthorized data flows at compile-time. However, they require precise type annotations …