Secure information flow by self-composition
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …
program execution. A common way to enforce secure information flow is through information …
Security of multithreaded programs by compilation
End-to-End security of mobile code requires that the code neither intentionally nor
accidentally propagates sensitive information to an adversary. Although mobile code is …
accidentally propagates sensitive information to an adversary. Although mobile code is …
Automated logic synthesis of random pattern testable circuits
NA Touba, EJ McCluskey - Proceedings., International Test …, 1995 - ieeexplore.ieee.org
Previous approaches to designing random pattern testable circuits use post-synthesis test
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …
[PDF][PDF] Information flow analysis for embedded systems: from practical to theoretical aspects
Y Bertot - 2008 - pepite-depot.univ-lille.fr
This work aims at providing a solution to confidentiality issues in multiapplicative systems:
ensuring security for an application running on small and autonomous systems by verifying …
ensuring security for an application running on small and autonomous systems by verifying …
Relational bytecode correlations
L Beringer - The Journal of Logic and Algebraic Programming, 2010 - Elsevier
We present a calculus for tracking equality relationships between values through pairs of
bytecode programs. The calculus may serve as a certification mechanism for non …
bytecode programs. The calculus may serve as a certification mechanism for non …
Class-level Non-Interference
D Zanardini - New Generation Computing, 2012 - Springer
Abstract The Information-Flow property of Non-Interference was recently relaxed into
Abstract Non-Interference (ANI), a weakened version where attackers can only observe …
Abstract Non-Interference (ANI), a weakened version where attackers can only observe …