A typed assembly language for confidentiality

D Yu, N Islam - European Symposium on Programming, 2006 - Springer
Abstract Language-based information-flow analysis is promising in protecting data
confidentiality. Although much work has been carried out in this area, relatively little has …

JCSI: A tool for checking secure information flow in java card applications

M Avvenuti, C Bernardeschi, N De Francesco… - Journal of Systems and …, 2012 - Elsevier
This paper describes a tool for checking secure information flow in Java Card applications.
The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The …

Efficient type inference for secure information flow

K Hristova, T Rothamel, YA Liu, SD Stoller - Proceedings of the 2006 …, 2006 - dl.acm.org
This paper describes the design, analysis, and implementation of an efficient algorithm for
information flow analysis expressed using a type system. Given a program and an …

[PDF][PDF] Non-interference and erasure policies for java card bytecode

RR Hansen, CW Probst - 6th International Workshop on Issues in the …, 2006 - imm.dtu.dk
Non-interference is the property of a program not to leak any secret information. In this paper
we propose a notion of non-interference for an abstract version of the Java Card bytecode …

On practical information flow policies for Java-enabled multiapplication smart cards

D Ghindici, I Simplot-Ryl - … Conference on Smart Card Research and …, 2008 - Springer
In the multiapplicative context of smart cards, a strict control of underlying information flow
between applications is highly desired. In this paper we propose a model to improve …

Statically checking confidentiality via dynamic labels

B Jacobs, W Pieters, M Warnier - Proceedings of the 2005 workshop on …, 2005 - dl.acm.org
This paper presents a new approach for verifying confidentiality for programs, based on
abstract interpretation. The framework is formally developed and proved correct in the …

Abstract certification of global non-interference in rewriting logic

M Alba-Castro, M Alpuente, S Escobar - International Symposium on …, 2009 - Springer
Non–interference is a semantic program property that assigns confidentiality levels to data
objects and prevents illicit information flows from occurring from high to low security levels …

[PDF][PDF] Java Bytecode Dependence Analysis for Secure Information Flow.

G Bian, K Nakayama, Y Kobayashi… - Int. J. Netw. Secur., 2007 - ijns.jalaxy.com.tw
Java programs can be transmitted and executed on another host in bytecode format, thus
the sensitive information of the host may be leaked via these assembly-like programs …

[PDF][PDF] Language Based Security for Java and JML

ME Warnier - 2006 - repository.ubn.ru.nl
Programs contain bugs. Finding program bugs is important, especially in situations where
safety and security of a program is required. This thesis proposes a number of analysis …

Identifying critical components during information security evaluations

A Rae, C Fidge - Journal of Research and Practice in …, 2005 - search.informit.org
Electronic communications devices intended for government or military applications must be
rigorously evaluated to ensure that they maintain data confidentiality. High-grade …