Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

Remote timing attacks are still practical

BB Brumley, N Tuveri - European Symposium on Research in Computer …, 2011 - Springer
For over two decades, timing attacks have been an active area of research within applied
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …

Secure information flow as a safety problem

T Terauchi, A Aiken - International Static Analysis Symposium, 2005 - Springer
The termination insensitive secure information flow problem can be reduced to solving a
safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …

Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - content.iospress.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Automatic discovery and quantification of information leaks

M Backes, B Köpf… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Information-flow analysis is a powerful technique for reasoning about the sensitive
information exposed by a program during its execution. We present the first automatic …

Dimensions and principles of declassification

A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

A model for delimited information release

A Sabelfeld, AC Myers - Software Security-Theories and Systems: Second …, 2004 - Springer
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …

A theorem proving approach to analysis of secure information flow

Á Darvas, R Hähnle, D Sands - … , SPC 2005, Boppard, Germany, April 6-8 …, 2005 - Springer
Most attempts at analysing secure information flow in programs are based on domain-
specific logics. Though computationally feasible, these approaches suffer from the need for …

Information Integrity: Are We There Yet?

K Harley, R Cooper - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The understanding and promotion of integrity in information security has traditionally been
underemphasized or even ignored. From implantable medical devices and electronic voting …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …