Certification of programs for secure information flow
From MaRDI portal
Publication:4134927
Cited in
(50)- Abstract interpretation of operational semantics for secure information flow.
- Symbolic abstract heaps for polymorphic information-flow guard inference
- Fast computation of strong control dependencies
- From exponential to polynomial-time security typing via principal types
- The enforcement of security policies for computation
- Type-based information flow analysis for the \(\pi\)-calculus
- Formal verification of side-channel countermeasures using self-composition
- Safe functional systems through integrity types and verified assembly
- Secure guarded commands
- Formalizing non-interference for a simple bytecode language in Coq
- Secure information flow by self-composition
- Automated enforcement for relaxed information release with reference points
- Hoare logic for disjunctive information flow
- Securing interaction between threads and the scheduler in the presence of synchronization
- scientific article; zbMATH DE number 1863561 (Why is no real title available?)
- Controlling file access with types
- Simple and efficient computation of minimal weak control closure
- Efficient Information-Flow Verification Under Speculative Execution
- Optimality and condensing of information flow through linear refinement
- Type systems equivalent to data-flow analyses for imperative languages
- Survey on JavaScript security policies and their enforcement mechanisms in a web browser
- Fast and incremental computation of weak control closure
- Efficient computation of arbitrary control dependencies
- A survey of challenges for runtime verification from advanced application domains (beyond software)
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Secure information flow connections
- Non-termination and secure information flow
- Securing a compiler transformation
- Information flow analysis for valued-indexed data security compartments
- Efficient static checker for tainted variable attacks
- Can you trust your data?
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Instruction-level security analysis for information flow in stack-based assembly languages
- Combining behavioural types with security analysis
- Abstract Certification of Global Non-interference in Rewriting Logic
- Type-based security for mobile computing integrity, secrecy and liveness
- An alternative characterization of weak order dependence
- Combining slicing and constraint solving for validation of measurement software
- Information flow control in software DB units based on formal verification
- Stepwise refinement of heap-manipulating code in Chalice
- A secrecy-preserving language for distributed and object-oriented systems
- Model-driven information flow security for component-based systems
- A unifying theory of control dependence and its application to arbitrary program structures
- Dynamic program slicing
- A security flow control algorithm and its denotational semantics correctness proof
- Flexible dynamic information flow control in the presence of exceptions
- Content dependent information flow control
- Cryptographically-masked flows
- Abstract semantic dependency
- The spirit of ghost code
This page was built for publication: Certification of programs for secure information flow
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4134927)