Temporal logics for hyperproperties

MR Clarkson, B Finkbeiner, M Koleini… - … 2014, Held as Part of the …, 2014 - Springer
Two new logics for verification of hyperproperties are proposed. Hyperproperties
characterize security policies, such as noninterference, as a property of sets of computation …

Scaling symbolic evaluation for automated verification of systems code with Serval

L Nelson, J Bornholt, R Gu, A Baumann… - Proceedings of the 27th …, 2019 - dl.acm.org
This paper presents Serval, a framework for developing automated verifiers for systems
software. Serval provides an extensible infrastructure for creating verifiers by lifting …

Secure information flow as a safety problem

T Terauchi, A Aiken - International Static Analysis Symposium, 2005 - Springer
The termination insensitive secure information flow problem can be reduced to solving a
safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …

Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - content.iospress.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs

C Hammer, G Snelting - International Journal of Information Security, 2009 - Springer
Abstract Information flow control (IFC) checks whether a program can leak secret data to
public ports, or whether critical computations can be influenced from outside. But many IFC …

Dimensions and principles of declassification

A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Information Integrity: Are We There Yet?

K Harley, R Cooper - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The understanding and promotion of integrity in information security has traditionally been
underemphasized or even ignored. From implantable medical devices and electronic voting …

Verification of a practical hardware security architecture through static information flow analysis

A Ferraiuolo, R Xu, D Zhang, AC Myers… - Proceedings of the …, 2017 - dl.acm.org
Hardware-based mechanisms for software isolation are becoming increasingly popular, but
implementing these mechanisms correctly has proved difficult, undermining the root of …

End-to-end verification of information-flow security for C and assembly programs

D Costanzo, Z Shao, R Gu - ACM SIGPLAN Notices, 2016 - dl.acm.org
Protecting the confidentiality of information manipulated by a computing system is one of the
most important challenges facing today's cybersecurity community. A promising step toward …