Sciweavers

244 search results - page 15 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
91
Voted
ERSHOV
2006
Springer
14 years 11 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
ICSE
1999
IEEE-ACM
15 years 1 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
IJCAI
2007
14 years 11 months ago
The Value of Observation for Monitoring Dynamic Systems
We consider the fundamental problem of monitoring (i.e. tracking) the belief state in a dynamic system, when the model is only approximately correct and when the initial belief st...
Eyal Even-Dar, Sham M. Kakade, Yishay Mansour