Hybrid monitors for concurrent noninterference
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …
resulting from interaction between threads. This problem is exacerbated if threads share …
A new algorithm for low-deterministic security
D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …
timing channels that may leak sensitive information. In this paper, we present a …
From trash to treasure: timing-sensitive garbage collection
MV Pedersen, A Askarov - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
This paper studies information flows via timing channels in the presence of automatic
memory management. We construct a series of example attacks that illustrate that garbage …
memory management. We construct a series of example attacks that illustrate that garbage …
Foundations for parallel information flow control runtime systems
We present the foundations for a new dynamic information flow control (IFC) parallel runtime
system, LIO _ PAR. To our knowledge, LIO _ PAR is the first dynamic language-level IFC …
system, LIO _ PAR. To our knowledge, LIO _ PAR is the first dynamic language-level IFC …
Advanced input modeling for simulation experimentation
B Schmeiser - Proceedings of the 31st conference on Winter …, 1999 - dl.acm.org
We discuss ideas useful to simulation practitioners when specifying the probability models
used to represent stochastic behavior. Emphasis is on situations in which the classical …
used to represent stochastic behavior. Emphasis is on situations in which the classical …
Extending the openshmem analyzer to perform synchronization and multi-valued analysis
S Pophale, O Hernandez, S Poole… - … MD, USA, March 4-6, 2014 …, 2014 - Springer
OpenSHMEM Analyzer (OSA) is a compiler-based tool that provides static analysis
forOpenSHMEMprograms. It was developed with the intention of providing feedback to the …
forOpenSHMEMprograms. It was developed with the intention of providing feedback to the …
Programming with flow-limited authorization: Coarser is better
MV Pedersen, S Chong - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Applications that handle sensitive information need to express and reason about the trust
relationships between security principals. Such reasoning is difficult because the trust …
relationships between security principals. Such reasoning is difficult because the trust …
Types for location and data security in cloud environments
Cloud service providers are often trusted to be genuine, the damage caused by being
discovered to be attacking their own customers outweighs any benefits such attacks could …
discovered to be attacking their own customers outweighs any benefits such attacks could …
Static analysis of software components for information flow security
DAL Poxon - 2021 - eprints.qut.edu.au
For developers to predict whether their code will leak secrets typically requires analysing the
whole program; for programs that are independently composed of software components by a …
whole program; for programs that are independently composed of software components by a …