From fine-to coarse-grained dynamic information flow control and back

M Vassena, A Russo, D Garg, V Rajani… - Proceedings of the ACM …, 2019 - dl.acm.org
We show that fine-grained and coarse-grained dynamic information-flow control (IFC)
systems are equally expressive. To this end, we mechanize two mostly standard languages …

Mechanized logical relations for termination-insensitive noninterference

SO Gregersen, J Bay, A Timany, L Birkedal - Proceedings of the ACM on …, 2021 - dl.acm.org
We present an expressive information-flow control type system with recursive types,
existential types, label polymorphism, and impredicative type polymorphism for a higher …

Securing interruptible enclaved execution on small microprocessors

M Busi, J Noorman, J Van Bulck, L Galletta… - ACM Transactions on …, 2021 - dl.acm.org
Computer systems often provide hardware support for isolation mechanisms such as
privilege levels, virtual memory, or enclaved execution. Over the past years, several …

Faceted secure multi execution

T Schmitz, M Algehed, C Flanagan… - Proceedings of the 2018 …, 2018 - dl.acm.org
To enforce non-interference, both Secure Multi-Execution (SME) and Multiple Facets (MF)
rely on the introduction of multi-executions. The attractiveness of these techniques is that …

Simple noninterference from parametricity

M Algehed, JP Bernardy - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
In this paper we revisit the connection between parametricity and noninterference. Our
primary contribution is a proof of noninterference for a polyvariant variation of the …

Semantics for Noninterference with Interaction Trees

L Silver, P He, E Cecchetti, AK Hirsch… - … Conference on Object …, 2023 - drops.dagstuhl.de
Noninterference is the strong information-security property that a program does not leak
secrets through publicly-visible behavior. In the presence of effects such as nontermination …

Liquid information flow control

N Polikarpova, D Stefan, J Yang, S Itzhaky… - Proceedings of the …, 2020 - dl.acm.org
We present Lifty, a domain-specific language for data-centric applications that manipulate
sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative …

Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels

S Wei, A Harris, Y Zhu, P Ramrakhyani… - … on Secure and …, 2024 - ieeexplore.ieee.org
Recent research in privacy-preserving systems relies on state-of-the-art defenses to close
the termination timing channel. In this paper, we challenge the effectiveness of the adopted …

Optimising faceted secure multi-execution

M Algehed, A Russo, C Flanagan - 2019 IEEE 32nd Computer …, 2019 - ieeexplore.ieee.org
Language-Based Information Flow Control (IFC) provides strong security guarantees for
untrusted code, but often suffers from a non-negligible rate of false alarms. Multi-execution …

Giving semantics to program-counter labels via secure effects

AK Hirsch, E Cecchetti - Proceedings of the ACM on Programming …, 2021 - dl.acm.org
Type systems designed for information-flow control commonly use a program-counter label
to track the sensitivity of the context and rule out data leakage arising from effectful …