Results 241 to 250 of about 4,354,998 (290)

Control flow obfuscation with information flow tracking

Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, 2009
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to secure software execution (e.g., taint tracking), protect software privacy and improve performance ...
Haibo Chen 0001   +5 more
openaire   +1 more source

Specifying Information-Flow Controls

25th IEEE International Conference on Distributed Computing Systems Workshops, 2005
The core problem in risk analysis - determining exploitable paths between attackers and system assets - is essentially a problem of determining information flow. It is relatively straightforward to interpret design models for service-based distributed systems in information-flow terms, but the analysis results must be integrated into the system ...
Howard Chivers, Jeremy Jacob
openaire   +1 more source

An information flow control meta-model

Proceedings of the 18th ACM symposium on Access control models and technologies, 2013
In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. The purposes for defining this meta-model is to achieve a more principled understanding of information flow control, to compare information flow control and access control at an abstract level, and to explore how information ...
Dennis G. Kafura, Denis Gracanin
openaire   +1 more source

A decentralized model for information flow control

ACM SIGOPS Operating Systems Review, 1997
This paper presents a new model for controlling information flo w in systems with mutual distrust and decentralized authority. The model allows users to share information with distrusted code (e.g., downloaded applets), yet still control how that code disseminates the shared information to others.
Andrew C. Myers, Barbara Liskov
openaire   +1 more source

Parametric information flow control in ehealth

2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015
We study the problem of enforcing information flow control (IFC) in ehealth systems to verify secure flow of information through programs. IFC mechanisms allow users to control the release and propagation of sensitive information so that confidential information is not observable to unintended principals while collaborating with other legitimate ...
Chandrika Bhardwaj, Sanjiva Prasad
openaire   +1 more source

Differential privacy with information flow control

Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, 2011
We investigate the integration of two approaches to information security: information flow analysis, in which the dependence between secret inputs and public outputs is tracked through a program, and differential privacy, in which a weak dependence between input and output is permitted but provided only through a relatively small set of known ...
Arnar Birgisson   +2 more
openaire   +1 more source

On Formalizing Information-Flow Control Libraries

Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
Many state-of-the-art IFC libraries support a variety of advanced features like mutuable data structures, exceptions, and concurrency, whose subtle interaction makes verification of security guarantees challenging. In this paper, we present a full-fledged, mechanically-verified model of MAC---a statically enforced IFC library.
Marco Vassena, Alejandro Russo
openaire   +1 more source

LOCKING PROTOCOL FOR INFORMATION FLOW CONTROL

Journal of Interconnection Networks, 2004
We discuss a novel role locking protocol (RLP) to prevent illegal information flow among objects in a role-based access control (RBAC) model. In this paper, we define a conflicting relation among roles "a role R1 conflicts with another role R2" to show that illegal information flow may occur if a transaction associated with role R1 is performed before
Ryung Chon   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy