Hybrid monitors for concurrent noninterference

A Askarov, S Chong, H Mantel - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …

A new algorithm for low-deterministic security

D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …

[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing

A Karbyshev, K Svendsen, A Askarov… - Principles of Security …, 2018 - library.oapen.org
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …

From trash to treasure: timing-sensitive garbage collection

MV Pedersen, A Askarov - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
This paper studies information flows via timing channels in the presence of automatic
memory management. We construct a series of example attacks that illustrate that garbage …

Foundations for parallel information flow control runtime systems

M Vassena, G Soeller, P Amidon, M Chan… - … on Principles of Security …, 2019 - Springer
We present the foundations for a new dynamic information flow control (IFC) parallel runtime
system, LIO _ PAR. To our knowledge, LIO _ PAR is the first dynamic language-level IFC …

Advanced input modeling for simulation experimentation

B Schmeiser - Proceedings of the 31st conference on Winter …, 1999 - dl.acm.org
We discuss ideas useful to simulation practitioners when specifying the probability models
used to represent stochastic behavior. Emphasis is on situations in which the classical …

Extending the openshmem analyzer to perform synchronization and multi-valued analysis

S Pophale, O Hernandez, S Poole… - … MD, USA, March 4-6, 2014 …, 2014 - Springer
OpenSHMEM Analyzer (OSA) is a compiler-based tool that provides static analysis
forOpenSHMEMprograms. It was developed with the intention of providing feedback to the …

Programming with flow-limited authorization: Coarser is better

MV Pedersen, S Chong - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Applications that handle sensitive information need to express and reason about the trust
relationships between security principals. Such reasoning is difficult because the trust …

Types for location and data security in cloud environments

I Gazeau, T Chothia, D Duggan - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Cloud service providers are often trusted to be genuine, the damage caused by being
discovered to be attacking their own customers outweighs any benefits such attacks could …

Static analysis of software components for information flow security

DAL Poxon - 2021 - eprints.qut.edu.au
For developers to predict whether their code will leak secrets typically requires analysing the
whole program; for programs that are independently composed of software components by a …