Eliminating cache-based timing attacks with instruction-based scheduling

D Stefan, P Buiras, EZ Yang, A Levy, D Terei… - … –ESORICS 2013: 18th …, 2013 - Springer
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …

A new algorithm for low-deterministic security

D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …

Confidentiality for probabilistic multi-threaded programs and its verification

T Minh Ngo, M Stoelinga, M Huisman - International Symposium on …, 2013 - Springer
Confidentiality is an important concern in today's information society: electronic payment and
personal data should be protected appropriately. This holds in particular for multi-threaded …

On improvements of low-deterministic security

J Breitner, J Graf, M Hecker, M Mohr… - … 2016, Held as Part of the …, 2016 - Springer
Low-security observable determinism (LSOD), as introduced by Roscoe and Zdancewic [18,
24], is the simplest criterion which guarantees probabilistic noninterference for concurrent …

Model checking the observational determinism security property using PROMELA and SPIN

M Dabaghchian, M Abdollahi Azgomi - Formal Aspects of Computing, 2015 - Springer
Observational determinism is a property that ensures the confidentiality in concurrent
programs. It conveys that public variables are independent of private variables during the …

Effective verification of confidentiality for multi-threaded programs

TM Ngo, M Stoelinga… - Journal of computer …, 2014 - content.iospress.com
This paper studies how confidentiality properties of multi-threaded programs can be verified
efficiently by a combination of newly developed and existing model checking algorithms. In …

Practical probability: Applying pGCL to lattice scheduling

D Cock - International Conference on Interactive Theorem …, 2013 - Springer
Building on our published mechanisation of the probabilistic program logic pGCL we
present a verified lattice scheduler, a standard covert-channel mitigation technique …

Low-deterministic security for low-nondeterministic programs

S Bischof, J Breitner, J Graf, M Hecker… - Journal of …, 2018 - content.iospress.com
We present a new algorithm, together with a full soundness proof, which guarantees
probabilistic noninterference (PN) for concurrent programs. The algorithm follows the “low …

Secure information flow analysis using the PRISM model checker

AA Noroozi, K Salehi, J Karimpour… - … Systems Security: 15th …, 2019 - Springer
Secure information flow checks whether sensitive information leak to public outputs of a
program or not. It has been widely used to analyze the security of various programs and …

Quantitative security analysis for multi-threaded programs

TM Ngo, M Huisman - arXiv preprint arXiv:1306.2693, 2013 - arxiv.org
Quantitative theories of information flow give us an approach to relax the absolute
confidentiality properties that are difficult to satisfy for many practical programs. The classical …