Tainted Secure Multi-Execution to Restrict Attacker Influence

MK McCall, A Bichhawat, L Jia - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …

Security properties through the lens of modal logic

M Soloviev, M Balliu… - 2024 IEEE 37th Computer …, 2024 - ieeexplore.ieee.org
We introduce a framework for reasoning about the security of computer systems using modal
logic. This framework is sufficiently expressive to capture a variety of known security …

Information Flow Control for Dynamic Reactive Systems

MK McCall - 2023 - search.proquest.com
It is common for reactive systems like web services to collect personal information and/or
perform sensitive tasks, making information flow control (IFC) in these applications …

Design and Implementation of Facets of Dynamic Policies

A Zegarelli - Companion Proceedings of the 2023 ACM SIGPLAN …, 2023 - dl.acm.org
Information Flow Control (IFC) in dynamic contexts is challenging due to different
interpretations of security that arise. This paper introduces a modular framework to address …

Restricting Attacker Influence in Reactive Programs with Dynamic Secrets

MK McCall, A Bichhawat, L Jia - kilthub.cmu.edu
Prior work has established that the attacker should not be allowed to influence what is
declassified or when declassification occurs. Meanwhile, other work looks at protecting …

[PDF][PDF] Modular Implementation and Formalization of Dynamic Policies Work In Progress

A Zegarelli, N Vazou, M Guarnieri - fcs-workshop.github.io
ABSTRACT In Information Flow Control (IFC) expressiveness, ie being able to model
multiple scenarios, is a crucial aspect, especially in the context of dynamically evolving …