A unified view of modalities in type systems
We propose to unify the treatment of a broad range of modalities in typed lambda calculi. We
do so by defining a generic structure of modalities, and show that this structure arises …
do so by defining a generic structure of modalities, and show that this structure arises …
Mechanized logical relations for termination-insensitive noninterference
We present an expressive information-flow control type system with recursive types,
existential types, label polymorphism, and impredicative type polymorphism for a higher …
existential types, label polymorphism, and impredicative type polymorphism for a higher …
Monadic and comonadic aspects of dependency analysis
P Choudhury - Proceedings of the ACM on Programming Languages, 2022 - dl.acm.org
Dependency analysis is vital to several applications in computer science. It lies at the
essence of secure information flow analysis, binding-time analysis, etc. Various calculi have …
essence of secure information flow analysis, binding-time analysis, etc. Various calculi have …
Semantics for Noninterference with Interaction Trees
Noninterference is the strong information-security property that a program does not leak
secrets through publicly-visible behavior. In the presence of effects such as nontermination …
secrets through publicly-visible behavior. In the presence of effects such as nontermination …
DDUO: General-purpose dynamic analysis for differential privacy
Differential privacy enables general statistical analysis of data with formal guarantees of
privacy protection at the individual level. Tools that assist data analysts with utilizing …
privacy protection at the individual level. Tools that assist data analysts with utilizing …
Giving semantics to program-counter labels via secure effects
Type systems designed for information-flow control commonly use a program-counter label
to track the sensitivity of the context and rule out data leakage arising from effectful …
to track the sensitivity of the context and rule out data leakage arising from effectful …
[PDF][PDF] Higher-Order Separation Logic for Distributed Systems and Security
SO Gregersen - 2023 - pure.au.dk
Rigorous reasoning about implementations of software systems requires a detailed
mathematical model of the behavior of the programming language. However, real-world …
mathematical model of the behavior of the programming language. However, real-world …
From Fine-to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow
This tutorial provides a complete and homogeneous account of the latest advances in fine-
and coarse-grained dynamic information-flow control (IFC) security. Since the 70s, the …
and coarse-grained dynamic information-flow control (IFC) security. Since the 70s, the …
Dynamic IFC theorems for free!
We show that noninterference and transparency, the key soundness theorems for dynamic
IFC libraries, can be obtained “for free”, as direct consequences of the more general …
IFC libraries, can be obtained “for free”, as direct consequences of the more general …
[LIBRO][B] On the Foundations of Practical Language-Based Security
M Algehed - 2021 - search.proquest.com
Abstract Language-based information flow control (IFC) promises to provide programming
languages and tools that make it easy for developers to write secure code. Traditionally …
languages and tools that make it easy for developers to write secure code. Traditionally …