Sciweavers

315 search results - page 25 / 63
» Arrows for secure information flow
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
ESORICS
2009
Springer
14 years 8 months ago
Tracking Information Flow in Dynamic Tree Structures
Abstract. This paper explores the problem of tracking information flow in dynamic tree structures. Motivated by the problem of manipulating the Document Object Model (DOM) trees by...
Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
CSFW
2007
IEEE
13 years 11 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
ICSE
2005
IEEE-ACM
14 years 7 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski