Output-sensitive information flow analysis
From MaRDI portal
Publication:6190181
DOI10.1007/978-3-030-21759-4_6MaRDI QIDQ6190181
Cristian Ene, Laurent Mounier, Marie-Laure Potet
Publication date: 6 February 2024
Published in: Formal Techniques for Distributed Objects, Components, and Systems (Search for Journal in Brave)
Cites Work
- Security types preserving compilation
- Verifying constant-time implementations by abstract interpretation
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS
- The Security Impact of a New Cryptographic Library
- Secure information flow by self-composition
- The program dependence graph and its use in optimization
- Transforming out timing leaks
- Downgrading policies and relaxed noninterference
- On flow-sensitive security types
- Verification, Model Checking, and Abstract Interpretation
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Output-sensitive information flow analysis