Collaborative verification of information flow for a high-assurance app store
Current app stores distribute some malware to unsuspecting users, even though the app
approval process may be costly and time-consuming. High-integrity app stores must provide …
approval process may be costly and time-consuming. High-integrity app stores must provide …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Formal API specification of the PikeOS separation kernel
PikeOS is an industrial operating system for safety and security critical applications in, for
example, avionics and automotive contexts. A consortium of several European partners from …
example, avionics and automotive contexts. A consortium of several European partners from …
Dynamic intransitive noninterference revisited
S Eggert, R van der Meyden - Formal Aspects of Computing, 2017 - Springer
The paper studies dynamic information flow security policies in an automaton-based model.
Two semantic interpretations of such policies are developed, both of which generalize the …
Two semantic interpretations of such policies are developed, both of which generalize the …
Strategic noninterference
W Jamroga, M Tabatabaei - ICT Systems Security and Privacy Protection …, 2015 - Springer
Noninterference is a property that captures confidentiality of actions executed by a given
process. However, the property is hard to guarantee in realistic scenarios. We show that the …
process. However, the property is hard to guarantee in realistic scenarios. We show that the …
Complexity and unwinding for intransitive noninterference
S Eggert, R van der Meyden, H Schnoor… - arXiv preprint arXiv …, 2013 - arxiv.org
The paper considers several definitions of information flow security for intransitive policies
from the point of view of the complexity of verifying whether a finite-state system is secure …
from the point of view of the complexity of verifying whether a finite-state system is secure …
Games and Strategies in Analysis of Security Properties
M Tabatabaei - 2016 - orbilu.uni.lu
Information security problems typically involve decision makers who choose and adjust their
behaviors in the interaction with each other in order to achieve their goals. Consequently …
behaviors in the interaction with each other in order to achieve their goals. Consequently …
Game semantics for non-deterministic security
C Chen - 2022 - figshare.mq.edu.au
The Shadow Semantics [47, 48, 50] models secure refinement, ie preservation of privacy
under adversarial inference attacks. Previous work has given a structural (affirmative) …
under adversarial inference attacks. Previous work has given a structural (affirmative) …
Information Security as Strategic (In) effectivity
W Jamroga, M Tabatabaei - International Workshop on Security and Trust …, 2016 - Springer
Security of information flow is commonly understood as preventing any information leakage,
regardless of how grave or harmless consequences the leakage can have. In this work, we …
regardless of how grave or harmless consequences the leakage can have. In this work, we …
On Reductions from Multi-Domain Noninterference to the Two-Level Case
O Woizekowski, R van der Meyden - … 26-30, 2016, Proceedings, Part I 21, 2016 - Springer
The literature on information flow security with respect to transitive policies has been
concentrated largely on the case of policies with two security domains, High and Low …
concentrated largely on the case of policies with two security domains, High and Low …