2016 IEEE 29th Computer Security Foundations Symposium (CSF) 2016
DOI: 10.1109/csf.2016.36
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
84
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(84 citation statements)
references
References 26 publications
0
84
0
Order By: Relevance
“…Greiner and Grahl [18] express indistinguishability by attacker for component-based systems via equivalence relations. Murray et al [37] define value-sensitive noninterference for compositional reasoning in concurrent programs. Value-sensitive noninterference emphasizes value-sensitive sources, as in the case of treating the security level of an input buffer or file depending on its runtime security label, enabling declassification policies to be value-dependent.…”
Section: Related Workmentioning
confidence: 99%
“…Greiner and Grahl [18] express indistinguishability by attacker for component-based systems via equivalence relations. Murray et al [37] define value-sensitive noninterference for compositional reasoning in concurrent programs. Value-sensitive noninterference emphasizes value-sensitive sources, as in the case of treating the security level of an input buffer or file depending on its runtime security label, enabling declassification policies to be value-dependent.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [20] use rely-guarantee style reasoning to reason about information flows in a message-passing distributed settings, where scheduler cannot be controlled. Murray et al [31] use mode-based reasoning in a flow-sensitive dependent type system to enforce timing-sensitive value-dependent non-interference for shared memory concurrent programs.…”
Section: Rely-guarantee Style Reasoning For Concurrent Information Flmentioning
confidence: 99%
“…Dependent Labels and Information Flow Security Dependent types have been widely studied and have been applied to practical programming languages (e.g., [7,16,31,32,41,42]). New challenges emerge for information flow analysis, such as precise, sound handling of information channels arising from label changes.…”
Section: Related Workmentioning
confidence: 99%
“…Exploring dependent labels to their full extent exposes new challenges that we tackle in this work, such as implicit declassification. Murray et al [31] present a flow-sensitive dependent security type system for shared-memory programs. The type system enforces a stronger security property: timing-sensitive non-interference for concurrent programs.…”
Section: Related Workmentioning
confidence: 99%