Collaborative verification of information flow for a high-assurance app store

MD Ernst, R Just, S Millstein, W Dietl… - Proceedings of the …, 2014 - dl.acm.org
Current app stores distribute some malware to unsuspecting users, even though the app
approval process may be costly and time-consuming. High-integrity app stores must provide …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Formal API specification of the PikeOS separation kernel

F Verbeek, O Havle, J Schmaltz, S Tverdyshev… - NASA Formal Methods …, 2015 - Springer
PikeOS is an industrial operating system for safety and security critical applications in, for
example, avionics and automotive contexts. A consortium of several European partners from …

Dynamic intransitive noninterference revisited

S Eggert, R van der Meyden - Formal Aspects of Computing, 2017 - Springer
The paper studies dynamic information flow security policies in an automaton-based model.
Two semantic interpretations of such policies are developed, both of which generalize the …

Strategic noninterference

W Jamroga, M Tabatabaei - ICT Systems Security and Privacy Protection …, 2015 - Springer
Noninterference is a property that captures confidentiality of actions executed by a given
process. However, the property is hard to guarantee in realistic scenarios. We show that the …

Complexity and unwinding for intransitive noninterference

S Eggert, R van der Meyden, H Schnoor… - arXiv preprint arXiv …, 2013 - arxiv.org
The paper considers several definitions of information flow security for intransitive policies
from the point of view of the complexity of verifying whether a finite-state system is secure …

Games and Strategies in Analysis of Security Properties

M Tabatabaei - 2016 - orbilu.uni.lu
Information security problems typically involve decision makers who choose and adjust their
behaviors in the interaction with each other in order to achieve their goals. Consequently …

Game semantics for non-deterministic security

C Chen - 2022 - figshare.mq.edu.au
The Shadow Semantics [47, 48, 50] models secure refinement, ie preservation of privacy
under adversarial inference attacks. Previous work has given a structural (affirmative) …

Information Security as Strategic (In) effectivity

W Jamroga, M Tabatabaei - International Workshop on Security and Trust …, 2016 - Springer
Security of information flow is commonly understood as preventing any information leakage,
regardless of how grave or harmless consequences the leakage can have. In this work, we …

On Reductions from Multi-Domain Noninterference to the Two-Level Case

O Woizekowski, R van der Meyden - … 26-30, 2016, Proceedings, Part I 21, 2016 - Springer
The literature on information flow security with respect to transitive policies has been
concentrated largely on the case of policies with two security domains, High and Low …