Sciweavers

ACSC
2006
IEEE

Tracing secure information flow through mode changes

14 years 2 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information through the device's circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device's distinct operating modes. However, such analyses overlook potential information flow between modes, via components that store information in one mode and release it in another. Here we show how graph-based analyses can be extended to allow for information flow through sequences of consecutive modes.
Colin J. Fidge, Tim McComb
Added 20 Aug 2010
Updated 20 Aug 2010
Type Conference
Year 2006
Where ACSC
Authors Colin J. Fidge, Tim McComb
Comments (0)