A typed assembly language for confidentiality
D Yu, N Islam - European Symposium on Programming, 2006 - Springer
Abstract Language-based information-flow analysis is promising in protecting data
confidentiality. Although much work has been carried out in this area, relatively little has …
confidentiality. Although much work has been carried out in this area, relatively little has …
JCSI: A tool for checking secure information flow in java card applications
M Avvenuti, C Bernardeschi, N De Francesco… - Journal of Systems and …, 2012 - Elsevier
This paper describes a tool for checking secure information flow in Java Card applications.
The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The …
The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The …
Efficient type inference for secure information flow
This paper describes the design, analysis, and implementation of an efficient algorithm for
information flow analysis expressed using a type system. Given a program and an …
information flow analysis expressed using a type system. Given a program and an …
[PDF][PDF] Non-interference and erasure policies for java card bytecode
Non-interference is the property of a program not to leak any secret information. In this paper
we propose a notion of non-interference for an abstract version of the Java Card bytecode …
we propose a notion of non-interference for an abstract version of the Java Card bytecode …
On practical information flow policies for Java-enabled multiapplication smart cards
D Ghindici, I Simplot-Ryl - … Conference on Smart Card Research and …, 2008 - Springer
In the multiapplicative context of smart cards, a strict control of underlying information flow
between applications is highly desired. In this paper we propose a model to improve …
between applications is highly desired. In this paper we propose a model to improve …
Statically checking confidentiality via dynamic labels
This paper presents a new approach for verifying confidentiality for programs, based on
abstract interpretation. The framework is formally developed and proved correct in the …
abstract interpretation. The framework is formally developed and proved correct in the …
Abstract certification of global non-interference in rewriting logic
Non–interference is a semantic program property that assigns confidentiality levels to data
objects and prevents illicit information flows from occurring from high to low security levels …
objects and prevents illicit information flows from occurring from high to low security levels …
[PDF][PDF] Java Bytecode Dependence Analysis for Secure Information Flow.
G Bian, K Nakayama, Y Kobayashi… - Int. J. Netw. Secur., 2007 - ijns.jalaxy.com.tw
Java programs can be transmitted and executed on another host in bytecode format, thus
the sensitive information of the host may be leaked via these assembly-like programs …
the sensitive information of the host may be leaked via these assembly-like programs …
[PDF][PDF] Language Based Security for Java and JML
ME Warnier - 2006 - repository.ubn.ru.nl
Programs contain bugs. Finding program bugs is important, especially in situations where
safety and security of a program is required. This thesis proposes a number of analysis …
safety and security of a program is required. This thesis proposes a number of analysis …
Identifying critical components during information security evaluations
Electronic communications devices intended for government or military applications must be
rigorously evaluated to ensure that they maintain data confidentiality. High-grade …
rigorously evaluated to ensure that they maintain data confidentiality. High-grade …