Secure information flow by self-composition

G Barthe, PR D'argenio, T Rezk - Mathematical Structures in …, 2011 - cambridge.org
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …

Security of multithreaded programs by compilation

G Barthe, T Rezk, A Russo, A Sabelfeld - ACM Transactions on …, 2010 - dl.acm.org
End-to-End security of mobile code requires that the code neither intentionally nor
accidentally propagates sensitive information to an adversary. Although mobile code is …

Automated logic synthesis of random pattern testable circuits

NA Touba, EJ McCluskey - Proceedings., International Test …, 1995 - ieeexplore.ieee.org
Previous approaches to designing random pattern testable circuits use post-synthesis test
point insertion to eliminate random pattern resistant (rpr) faults. The approach taken in this …

[PDF][PDF] Information flow analysis for embedded systems: from practical to theoretical aspects

Y Bertot - 2008 - pepite-depot.univ-lille.fr
This work aims at providing a solution to confidentiality issues in multiapplicative systems:
ensuring security for an application running on small and autonomous systems by verifying …

Relational bytecode correlations

L Beringer - The Journal of Logic and Algebraic Programming, 2010 - Elsevier
We present a calculus for tracking equality relationships between values through pairs of
bytecode programs. The calculus may serve as a certification mechanism for non …

Class-level Non-Interference

D Zanardini - New Generation Computing, 2012 - Springer
Abstract The Information-Flow property of Non-Interference was recently relaxed into
Abstract Non-Interference (ANI), a weakened version where attackers can only observe …