Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
On subnormal floating point and abnormal timing
We identify a timing channel in the floating point instructions of modern x86 processors: the
running time of floating point addition and multiplication instructions can vary by two orders …
running time of floating point addition and multiplication instructions can vary by two orders …
Multiple facets for dynamic information flow
TH Austin, C Flanagan - Proceedings of the 39th annual ACM SIGPLAN …, 2012 - dl.acm.org
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …
security problems, including cross-site scripting attacks and malicious advertising code …
FlowFox: a web browser with flexible and precise information flow control
We present FlowFox, the first fully functional web browser that implements a precise and
general information flow control mechanism for web scripts based on the technique of …
general information flow control mechanism for web scripts based on the technique of …
Information flow control for secure cloud computing
J Bacon, D Eyers, TFJM Pasquier… - … on network and …, 2014 - ieeexplore.ieee.org
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this
language, well-typed programs provably leak only a bounded amount of information over …
language, well-typed programs provably leak only a bounded amount of information over …
Secure serverless computing using dynamic information flow control
The rise of serverless computing provides an opportunity to rethink cloud security. We
present an approach for securing serverless systems using a novel form of dynamic …
present an approach for securing serverless systems using a novel form of dynamic …
Memory trace oblivious program execution
Cloud computing allows users to delegate data and computation to cloud service providers,
at the cost of giving up physical control of their computing infrastructure. An attacker (eg …
at the cost of giving up physical control of their computing infrastructure. An attacker (eg …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Eliminating cache-based timing attacks with instruction-based scheduling
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …
information without leaking this information. However, the presence of covert channels …