Using bypass to tighten WCET estimates for multi-core processors with shared instruction caches

D Hardy, T Piquet, I Puaut - 2009 30th IEEE Real-Time Systems …, 2009 - ieeexplore.ieee.org
Multi-core chips have been increasingly adopted by the microprocessor industry. For real-
time systems to exploit multi-core architectures, it is required to obtain both tight and safe …

Compositional verification and refinement of concurrent value-dependent noninterference

T Murray, R Sison, E Pierzchalski… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Value-dependent noninterference allows the classification of program variables to depend
on the contents of other variables, and therefore is able to express a range of data …

Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications

T Murray, M Tiwari, G Ernst, DA Naumann - Proceedings of the 2023 …, 2023 - dl.acm.org
We consider the problem of specifying and proving the security of non-trivial, concurrent
programs that intentionally leak information. We present a method that decomposes the …

Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels

S Wei, A Harris, Y Zhu, P Ramrakhyani… - … on Secure and …, 2024 - ieeexplore.ieee.org
Recent research in privacy-preserving systems relies on state-of-the-art defenses to close
the termination timing channel. In this paper, we challenge the effectiveness of the adopted …

[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing

A Karbyshev, K Svendsen, A Askarov… - Principles of Security …, 2018 - library.oapen.org
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …

Backwards-directed information flow analysis for concurrent programs

K Winter, N Coughlin, G Smith - 2021 IEEE 34th Computer …, 2021 - ieeexplore.ieee.org
A number of approaches have been developed for analysing information flow in concurrent
programs in a compositional manner, ie, in terms of one thread at a time. Early approaches …

Towards a flow-and path-sensitive information flow analysis

P Li, D Zhang - 2017 IEEE 30th Computer Security Foundations …, 2017 - ieeexplore.ieee.org
This paper investigates a flow-and path-sensitive static information flow analysis. Compared
with security type systems with fixed labels, it has been shown that flow-sensitive type …

Timing-sensitive noninterference through composition

W Rafnsson, L Jia, L Bauer - Principles of Security and Trust: 6th …, 2017 - Springer
Sound compositional reasoning principles are the foundation for analyzing the security
properties of complex systems. We present a general theory for compositional reasoning …

Modular verification of information flow security in component-based systems

S Greiner, M Mohr, B Beckert - … , SEFM 2017, Trento, Italy, September 4–8 …, 2017 - Springer
We propose a novel method for the verification of information flow security in component-
based systems. The method is (a) modular wrt services and components, ie, overall security …

Gradual security types and gradual guarantees

A Bichhawat, MK McCall, L Jia - 2021 IEEE 34th Computer …, 2021 - ieeexplore.ieee.org
Information flow type systems enforce the security property of noninterference by detecting
unauthorized data flows at compile-time. However, they require precise type annotations …