A hardware design language for timing-sensitive information-flow security

D Zhang, Y Wang, GE Suh, AC Myers - Acm Sigplan Notices, 2015 - dl.acm.org
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …

Automatic malware classification and new malware detection using machine learning

L Liu, B Wang, B Yu, Q Zhong - Frontiers of Information Technology & …, 2017 - Springer
The explosive growth of malware variants poses a major threat to information security.
Traditional anti-virus systems based on signatures fail to classify unknown malware into their …

[图书][B] Concrete semantics: with Isabelle/HOL

T Nipkow, G Klein - 2014 - Springer
Part I of this book is a practical introduction to working with the Isabelle proof assistant. It
teaches you how to write functional programs and inductive definitions and how to prove …

Noninterference through secure multi-execution

D Devriese, F Piessens - 2010 IEEE Symposium on Security …, 2010 - ieeexplore.ieee.org
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a
higher security level than their own. Various researchers have demonstrated how this …

JSFlow: Tracking information flow in JavaScript and its APIs

D Hedin, A Birgisson, L Bello, A Sabelfeld - Proceedings of the 29th …, 2014 - dl.acm.org
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …

Multiple facets for dynamic information flow

TH Austin, C Flanagan - Proceedings of the 39th annual ACM SIGPLAN …, 2012 - dl.acm.org
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

Information-flow security for a core of JavaScript

D Hedin, A Sabelfeld - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
Tracking information flow in dynamic languages remains an important and intricate problem.
This paper makes substantial headway toward understanding the main challenges and …

Flexible dynamic information flow control in Haskell

D Stefan, A Russo, JC Mitchell… - Proceedings of the 4th …, 2011 - dl.acm.org
We describe a new, dynamic, floating-label approach to language-based information flow
control, and present an implementation in Haskell. A labeled IO monad, LIO, keeps track of a …

Information flow control for secure cloud computing

J Bacon, D Eyers, TFJM Pasquier… - … on network and …, 2014 - ieeexplore.ieee.org
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …