Eliminating cache-based timing attacks with instruction-based scheduling
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …
information without leaking this information. However, the presence of covert channels …
A new algorithm for low-deterministic security
D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
Confidentiality for probabilistic multi-threaded programs and its verification
Confidentiality is an important concern in today's information society: electronic payment and
personal data should be protected appropriately. This holds in particular for multi-threaded …
personal data should be protected appropriately. This holds in particular for multi-threaded …
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr… - … 2016, Held as Part of the …, 2016 - Springer
Low-security observable determinism (LSOD), as introduced by Roscoe and Zdancewic [18,
24], is the simplest criterion which guarantees probabilistic noninterference for concurrent …
24], is the simplest criterion which guarantees probabilistic noninterference for concurrent …
Model checking the observational determinism security property using PROMELA and SPIN
M Dabaghchian, M Abdollahi Azgomi - Formal Aspects of Computing, 2015 - Springer
Observational determinism is a property that ensures the confidentiality in concurrent
programs. It conveys that public variables are independent of private variables during the …
programs. It conveys that public variables are independent of private variables during the …
Effective verification of confidentiality for multi-threaded programs
TM Ngo, M Stoelinga… - Journal of computer …, 2014 - content.iospress.com
This paper studies how confidentiality properties of multi-threaded programs can be verified
efficiently by a combination of newly developed and existing model checking algorithms. In …
efficiently by a combination of newly developed and existing model checking algorithms. In …
Practical probability: Applying pGCL to lattice scheduling
D Cock - International Conference on Interactive Theorem …, 2013 - Springer
Building on our published mechanisation of the probabilistic program logic pGCL we
present a verified lattice scheduler, a standard covert-channel mitigation technique …
present a verified lattice scheduler, a standard covert-channel mitigation technique …
Low-deterministic security for low-nondeterministic programs
S Bischof, J Breitner, J Graf, M Hecker… - Journal of …, 2018 - content.iospress.com
We present a new algorithm, together with a full soundness proof, which guarantees
probabilistic noninterference (PN) for concurrent programs. The algorithm follows the “low …
probabilistic noninterference (PN) for concurrent programs. The algorithm follows the “low …
Secure information flow analysis using the PRISM model checker
Secure information flow checks whether sensitive information leak to public outputs of a
program or not. It has been widely used to analyze the security of various programs and …
program or not. It has been widely used to analyze the security of various programs and …
Quantitative security analysis for multi-threaded programs
Quantitative theories of information flow give us an approach to relax the absolute
confidentiality properties that are difficult to satisfy for many practical programs. The classical …
confidentiality properties that are difficult to satisfy for many practical programs. The classical …