This paper presents Serval, a framework for developing automated verifiers for systems software. Serval provides an extensible infrastructure for creating verifiers by lifting …
T Terauchi, A Aiken - International Static Analysis Symposium, 2005 - Springer
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …
A Sabelfeld, D Sands - Journal of Computer Security, 2009 - content.iospress.com
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release …
C Hammer, G Snelting - International Journal of Information Security, 2009 - Springer
Abstract Information flow control (IFC) checks whether a program can leak secret data to public ports, or whether critical computations can be influenced from outside. But many IFC …
A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release …
D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program during execution to make sure that the program handles the information securely. Secure …
K Harley, R Cooper - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting …
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of …
D Costanzo, Z Shao, R Gu - ACM SIGPLAN Notices, 2016 - dl.acm.org
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward …