Noninterference for operating system kernels
While intransitive noninterference is a natural property for any secure OS kernel to enforce,
proving that the implementation of any particular general-purpose kernel enforces this …
proving that the implementation of any particular general-purpose kernel enforces this …
Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation
TT Gamage, BM McMillin… - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
This paper presents a general theory of event compensation as an information flow security
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …
Flexible scheduler-independent security
H Mantel, H Sudbrock - … –ESORICS 2010: 15th European Symposium on …, 2010 - Springer
We propose an approach to certify the information flow security of multi-threaded programs
independently from the scheduling algorithm. A scheduler-independent verification is …
independently from the scheduling algorithm. A scheduler-independent verification is …
Securing timeout instructions in web applications
A Russo, A Sabelfeld - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
Timeout mechanisms are a useful feature for web applications. However, these mechanisms
need to be used with care because, if used as-is, they are vulnerable to timing attacks. This …
need to be used with care because, if used as-is, they are vulnerable to timing attacks. This …
Security of multithreaded programs by compilation
End-to-End security of mobile code requires that the code neither intentionally nor
accidentally propagates sensitive information to an adversary. Although mobile code is …
accidentally propagates sensitive information to an adversary. Although mobile code is …
Automated logic synthesis of random pattern testable circuits
NA Touba, EJ McCluskey - Proceedings., International Test …, 1995 - ieeexplore.ieee.org
Previous approaches to designing random pattern testable circuits use post-synthesis test
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …
Security of multithreaded programs by compilation
Abstract Information security is a pressing challenge for mobile code technologies. In order
to claim end-to-end security of mobile code, it is necessary to establish that the code neither …
to claim end-to-end security of mobile code, it is necessary to establish that the code neither …
Security via Noninterference: Analyzing Information Flows
S Eggert - 2014 - macau.uni-kiel.de
Nowadays, the security of information systems is of crucial importance. The large number of
detected security vulnerabilities in many systems indicates that new methods for developing …
detected security vulnerabilities in many systems indicates that new methods for developing …
The complexity of synchronous notions of information flow security
The paper considers the complexity of verifying that a finite state system satisfies a number
of definitions of information flow security. The systems model considered is one in which …
of definitions of information flow security. The systems model considered is one in which …
Information flow in systems with schedulers, Part I: Definitions
R Van Der Meyden, C Zhang - Theoretical Computer Science, 2013 - Elsevier
This paper studies information flow security in a synchronous state machine model, in which
agents share a global clock and can make observations at all times, but in which an agent's …
agents share a global clock and can make observations at all times, but in which an agent's …