2014
DOI: 10.1007/s10207-014-0257-6
|View full text |Cite
|
Sign up to set email alerts
|

A new algorithm for low-deterministic security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 43 publications
0
28
0
Order By: Relevance
“…They have developed JOANA [21], an object sensitive and context sensitive tool for checking noninterference in Java bytecode [22], shown their techniques to be sound [59], and considered information flow in concurrent programs [17]. They also use path conditions to improve precision by ruling out impossible paths [54].…”
Section: Related Workmentioning
confidence: 99%
“…They have developed JOANA [21], an object sensitive and context sensitive tool for checking noninterference in Java bytecode [22], shown their techniques to be sound [59], and considered information flow in concurrent programs [17]. They also use path conditions to improve precision by ruling out impossible paths [54].…”
Section: Related Workmentioning
confidence: 99%
“…Giffhorn and Snelting [14] use a PDG-based whole program analysis to enforce relaxed low-security observational determinism (RLSOD) in Java programs. RLSOD is similar to our security condition in that it allows low-nondeterminism as long as it does not depend on secrets.…”
Section: Scheduler-independent Approachesmentioning
confidence: 99%
“…Following the algorithmic approach, Giffhorn et al [37] propose a verification method based on program dependence graphs to check observational determinism. A program dependence graph models information flow through a program, where nodes are program statements, and edges are data dependences or control dependences.…”
Section: Related Workmentioning
confidence: 99%
“…The following program, borrowed from [37,85], consists of three threads that read a private value PIN , and then compute a public value result. Via this case study, we show that due to the interaction between threads and the control of an appropriate scheduler, the confidentiality of a multi-threaded program might be violated.…”
Section: Case Study 1: a Possibilistic Modelmentioning
confidence: 99%
See 1 more Smart Citation