Assumptions and guarantees for compositional noninterference

H Mantel, D Sands, H Sudbrock - 2011 IEEE 24th Computer …, 2011 - ieeexplore.ieee.org
The idea of building secure systems by plugging together" secure''components is appealing,
but this requires a definition of security which, in addition to taking care of top-level security …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Checking probabilistic noninterference using JOANA

G Snelting, D Giffhorn, J Graf, C Hammer… - it-Information …, 2014 - degruyter.com
JOANA is a tool for software security analysis, checking up to 100 kLOC of full multi-
threaded Java. JOANA is based on sophisticated program analysis techniques and thus …

HyperATL*: A logic for hyperproperties in multi-agent systems

R Beutner, B Finkbeiner - Logical Methods in Computer …, 2023 - lmcs.episciences.org
Hyperproperties are system properties that relate multiple computation paths in a system
and are commonly used to, eg, define information-flow policies. In this paper, we study a …

Hybrid monitors for concurrent noninterference

A Askarov, S Chong, H Mantel - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …

[HTML][HTML] Mac a verified static information-flow control library

M Vassena, A Russo, P Buiras, L Waye - Journal of logical and algebraic …, 2018 - Elsevier
The programming language Haskell plays a unique, privileged role in information-flow
control (IFC) research: it is able to enforce information security via libraries. Many state-of …

A temporal logic for strategic hyperproperties

R Beutner, B Finkbeiner - arxiv preprint arxiv:2107.02509, 2021 - arxiv.org
Hyperproperties are commonly used in computer security to define information-flow policies
and other requirements that reason about the relationship between multiple computations. In …

A new algorithm for low-deterministic security

D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …

[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing

A Karbyshev, K Svendsen, A Askarov… - Principles of Security …, 2018 - library.oapen.org
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …

Towards a practical secure concurrent language

S Muller, S Chong - Proceedings of the ACM international conference on …, 2012 - dl.acm.org
We demonstrate that a practical concurrent language can be extended in a natural way with
information security mechanisms that provably enforce strong information security …