2016 IEEE 29th Computer Security Foundations Symposium (CSF) 2016
DOI: 10.1109/csf.2016.35
|View full text |Cite
|
Sign up to set email alerts
|

Fault-Resilient Non-interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…Other works focus on type-preservation for type systems which enforce secure information flow [Barthe et al 2006;Chen et al 2010;Tedesco et al 2016]. It is worth noting that the two approaches are incomparable, since the type systems are incomplete and therefore preservation of information-flow typing does not entail preservation of non-interference nor the converse for similar reasons.…”
Section: Related Workmentioning
confidence: 99%
“…Other works focus on type-preservation for type systems which enforce secure information flow [Barthe et al 2006;Chen et al 2010;Tedesco et al 2016]. It is worth noting that the two approaches are incomparable, since the type systems are incomplete and therefore preservation of information-flow typing does not entail preservation of non-interference nor the converse for similar reasons.…”
Section: Related Workmentioning
confidence: 99%
“…It ensures that the first n steps (or fewer if the program terminates before that) are safe and preserve -equivalence of the heap locations specified initially in P , but in a way that is compositional across multiple execution steps, across multiple threads of execution and across different parts of the heap. It is somewhat akin, although more precise than, prior characterizations based on strong low bisimulation [16,45].…”
Section: Security Definition and Soundnessmentioning
confidence: 94%
“…(abusing notation to let the semantic stand for some expression that denotes it). Property (16) encodes that constants do not depend on any state; again the security level expression e l must be meaningful, but trivially c :: when is constant, too. Value sensitivity is congruent with function application (17).…”
Section: Propositionmentioning
confidence: 99%
“…Here we introduce RISC with mutex locks (hereafter RISC), the target of our compiler, based on the RISC architecture targeted by the compilation scheme of Tedesco et al (2016):…”
Section: Initial Conditions Ensuring Global Modes Compatibilitymentioning
confidence: 99%
“…Apart from this notational adaptation to the configuration triple format for CVDNI proofs, the RISC language's evaluation semantics follows that of the RISC target architecture of Tedesco et al (2016), to which we relegate further details. For the new LockAcq k and LockRel k operations, the program counter is incremented by the RISC equivalents for the LOCKACQ and LOCKREL evaluation rules for the While language, and left unchanged by those for LOCKSPIN and LOCKINVALID (these were described by Section 3.1).…”
Section: Initial Conditions Ensuring Global Modes Compatibilitymentioning
confidence: 99%