Compositional verification and refinement of concurrent value-dependent noninterference
Value-dependent noninterference allows the classification of program variables to depend
on the contents of other variables, and therefore is able to express a range of data …
on the contents of other variables, and therefore is able to express a range of data …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
COVERN: A logic for compositional verification of information flow control
Shared memory concurrency is pervasive in modern programming, including in systems that
must protect highly sensitive data. Recently, verification has finally emerged as a practical …
must protect highly sensitive data. Recently, verification has finally emerged as a practical …
Compositional non-interference for fine-grained concurrent programs
Non-interference is a program property that ensures the absence of information leaks. In the
context of programming languages, there exist two common approaches for establishing …
context of programming languages, there exist two common approaches for establishing …
SecCSL: Security Concurrent Separation Logic
We present SecCSL, a concurrent separation logic for proving expressive, data-dependent
information flow security properties of low-level programs. SecCSL is considerably more …
information flow security properties of low-level programs. SecCSL is considerably more …
Types for information flow control: Labeling granularity and semantic models
Language-based information flow control (IFC) tracks dependencies within a program using
sensitivity labels and prohibits public outputs from depending on secret inputs. In particular …
sensitivity labels and prohibits public outputs from depending on secret inputs. In particular …
Hybrid monitors for concurrent noninterference
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …
resulting from interaction between threads. This problem is exacerbated if threads share …
Verifying that a compiler preserves concurrent value-dependent information-flow security
It is common to prove by reasoning over source code that programs do not leak sensitive
data. But doing so leaves a gap between reasoning and reality that can only be filled by …
data. But doing so leaves a gap between reasoning and reality that can only be filled by …
A new algorithm for low-deterministic security
D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
Alpha-beta privacy
S Mödersheim, L Viganò - ACM Transactions on Privacy and Security …, 2019 - dl.acm.org
The formal specification of privacy goals in symbolic protocol models has proved to be not
quite trivial so far. The most widely used approach in formal methods is based on the static …
quite trivial so far. The most widely used approach in formal methods is based on the static …