Language-based information-flow security
A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
Remote timing attacks are still practical
For over two decades, timing attacks have been an active area of research within applied
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …
Secure information flow as a safety problem
The termination insensitive secure information flow problem can be reduced to solving a
safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …
safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …
Declassification: Dimensions and principles
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
Automatic discovery and quantification of information leaks
Information-flow analysis is a powerful technique for reasoning about the sensitive
information exposed by a program during its execution. We present the first automatic …
information exposed by a program during its execution. We present the first automatic …
Dimensions and principles of declassification
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
A model for delimited information release
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …
information release. In the context of confidentiality, a typical security guarantee provided by …
A theorem proving approach to analysis of secure information flow
Most attempts at analysing secure information flow in programs are based on domain-
specific logics. Though computationally feasible, these approaches suffer from the need for …
specific logics. Though computationally feasible, these approaches suffer from the need for …
Information Integrity: Are We There Yet?
K Harley, R Cooper - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The understanding and promotion of integrity in information security has traditionally been
underemphasized or even ignored. From implantable medical devices and electronic voting …
underemphasized or even ignored. From implantable medical devices and electronic voting …
A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …