Hyperproperties

MR Clarkson, FB Schneider - Journal of Computer Security, 2010 - content.iospress.com
Trace properties, which have long been used for reasoning about systems, are sets of
execution traces. Hyperproperties, introduced here, are sets of trace properties …

Temporal logics for hyperproperties

MR Clarkson, B Finkbeiner, M Koleini… - … 2014, Held as Part of the …, 2014 - Springer
Two new logics for verification of hyperproperties are proposed. Hyperproperties
characterize security policies, such as noninterference, as a property of sets of computation …

A hardware design language for timing-sensitive information-flow security

D Zhang, Y Wang, GE Suh, AC Myers - Acm Sigplan Notices, 2015 - dl.acm.org
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …

Secure information flow by self-composition

G Barthe, PR D'argenio, T Rezk - Mathematical Structures in …, 2011 - cambridge.org
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …

Remote timing attacks are still practical

BB Brumley, N Tuveri - European Symposium on Research in Computer …, 2011 - Springer
For over two decades, timing attacks have been an active area of research within applied
cryptography. These attacks exploit cryptosystem or protocol implementations that do not run …

A formal approach to secure speculation

K Cheang, C Rasmussen, S Seshia… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Transient execution attacks like Spectre, Meltdown and Foreshadow have shown that
combinations of microarchitectural side-channels can be synergistically exploited to create …

Predictive black-box mitigation of timing channels

A Askarov, D Zhang, AC Myers - … of the 17th ACM conference on …, 2010 - dl.acm.org
We investigate techniques for general black-box mitigation of timing channels. The source of
events is wrapped by a timing mitigator that delays output events so that they contain only a …

Language-based control and mitigation of timing channels

D Zhang, A Askarov, AC Myers - Proceedings of the 33rd ACM SIGPLAN …, 2012 - dl.acm.org
We propose a new language-based approach to mitigating timing channels. In this
language, well-typed programs provably leak only a bounded amount of information over …

Caisson: a hardware description language for secure information flow

X Li, M Tiwari, JK Oberg, V Kashyap, FT Chong… - ACM Sigplan …, 2011 - dl.acm.org
Information flow is an important security property that must be incorporated from the ground
up, including at hardware design time, to provide a formal basis for a system's root of trust …

Verification of a practical hardware security architecture through static information flow analysis

A Ferraiuolo, R Xu, D Zhang, AC Myers… - Proceedings of the …, 2017 - dl.acm.org
Hardware-based mechanisms for software isolation are becoming increasingly popular, but
implementing these mechanisms correctly has proved difficult, undermining the root of …