Sciweavers

519 search results - page 85 / 104
» Control flow obfuscation with information flow tracking
Sort
View
WISA
2007
Springer
15 years 5 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
RTSS
1994
IEEE
15 years 3 months ago
Bounding Worst-Case Instruction Cache Performance
The use of caches poses a difficult tradeoff for architects of real-time systems. While caches provide significant performance advantages, they have also been viewed as inherently...
Robert D. Arnold, Frank Mueller, David B. Whalley,...
ESORICS
2009
Springer
15 years 3 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 10 months ago
Computer Aided Design Modeling for Heterogeneous Objects
Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not conta...
Vikas Gupta, K. S. Kasana, Puneet Tandon
POPL
2008
ACM
16 years 1 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk