Noninterference for operating system kernels

T Murray, D Matichuk, M Brassil, P Gammie… - Certified Programs and …, 2012 - Springer
While intransitive noninterference is a natural property for any secure OS kernel to enforce,
proving that the implementation of any particular general-purpose kernel enforces this …

Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation

TT Gamage, BM McMillin… - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
This paper presents a general theory of event compensation as an information flow security
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …

Flexible scheduler-independent security

H Mantel, H Sudbrock - … –ESORICS 2010: 15th European Symposium on …, 2010 - Springer
We propose an approach to certify the information flow security of multi-threaded programs
independently from the scheduling algorithm. A scheduler-independent verification is …

Securing timeout instructions in web applications

A Russo, A Sabelfeld - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
Timeout mechanisms are a useful feature for web applications. However, these mechanisms
need to be used with care because, if used as-is, they are vulnerable to timing attacks. This …

Security of multithreaded programs by compilation

G Barthe, T Rezk, A Russo, A Sabelfeld - ACM Transactions on …, 2010 - dl.acm.org
End-to-End security of mobile code requires that the code neither intentionally nor
accidentally propagates sensitive information to an adversary. Although mobile code is …

Automated logic synthesis of random pattern testable circuits

NA Touba, EJ McCluskey - Proceedings., International Test …, 1995 - ieeexplore.ieee.org
Previous approaches to designing random pattern testable circuits use post-synthesis test
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …

Security of multithreaded programs by compilation

G Barthe, T Rezk, A Russo, A Sabelfeld - Computer Security–ESORICS …, 2007 - Springer
Abstract Information security is a pressing challenge for mobile code technologies. In order
to claim end-to-end security of mobile code, it is necessary to establish that the code neither …

Security via Noninterference: Analyzing Information Flows

S Eggert - 2014 - macau.uni-kiel.de
Nowadays, the security of information systems is of crucial importance. The large number of
detected security vulnerabilities in many systems indicates that new methods for developing …

The complexity of synchronous notions of information flow security

F Cassez, R van Der Meyden, C Zhang - … , FOSSACS 2010, Held as Part of …, 2010 - Springer
The paper considers the complexity of verifying that a finite state system satisfies a number
of definitions of information flow security. The systems model considered is one in which …

Information flow in systems with schedulers, Part I: Definitions

R Van Der Meyden, C Zhang - Theoretical Computer Science, 2013 - Elsevier
This paper studies information flow security in a synchronous state machine model, in which
agents share a global clock and can make observations at all times, but in which an agent's …