Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - journals.sagepub.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Multiple facets for dynamic information flow

TH Austin, C Flanagan - Proceedings of the 39th annual ACM SIGPLAN …, 2012 - dl.acm.org
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …

Efficient purely-dynamic information flow analysis

TH Austin, C Flanagan - Proceedings of the ACM SIGPLAN Fourth …, 2009 - dl.acm.org
We present a novel approach for efficiently tracking information flow in a dynamically-typed
language such as JavaScript. Our approach is purely dynamic, and it detects problems with …

Dimensions and principles of declassification

A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Permissive dynamic information flow analysis

TH Austin, C Flanagan - Proceedings of the 5th ACM SIGPLAN …, 2010 - dl.acm.org
A key challenge in dynamic information flow analysis is handling implicit flows, where code
conditional on a private variable updates a public variable x. The naive approach of …

Gradual release: Unifying declassification, encryption and key release policies

A Askarov, A Sabelfeld - … on Security and Privacy (SP'07), 2007 - ieeexplore.ieee.org
Information security has a challenge to address: enabling information-flow controls with
expressive information release (or declassification) policies. Existing approaches tend to …

Bootstrap** privacy compliance in big data systems

S Sen, S Guha, A Datta, SK Rajamani… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
With the rapid increase in cloud services collecting and using user data to offer personalized
experiences, ensuring that these services comply with their privacy policies has become a …

Security verification of the opentitan hardware root of trust

A Meza, F Restuccia, J Oberg, D Rizzo… - IEEE Security & …, 2023 - ieeexplore.ieee.org
We describe the security verification of OpenTitan. We illustrate how information flow
tracking turns human knowledge of assets and security requirements into formal security …

Expressive declassification policies and modular static enforcement

A Banerjee, DA Naumann… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
This paper provides a way to specify expressive declassification policies, in particular, when,
what, and where policies that include conditions under which downgrading is allowed …