A Semantic Framework for Direct Information Flows in Hybrid-Dynamic Systems
Abstract
References
Index Terms
- A Semantic Framework for Direct Information Flows in Hybrid-Dynamic Systems
Recommendations
A permission-carrying security policy and static enforcement for information flows in Android programs
AbstractTo detect information leaks in Android programs, existing taint analysis approaches usually specify and enforce (statically or dynamically) the two-level information flow policy, represented by a lattice ( { ⊤ , ⊥ } , ⊑ ) with ⊥ ⊑ ⊤. ...
A Hybrid, Dynamic Logic for Hybrid-Dynamic Information Flow
LICS '18: Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer ScienceInformation-flow security is important to the safety and privacy of cyber-physical systems (CPSs) across many domains: information leakage can both violate user privacy and reveal vulnerabilities to physical attacks. CPSs face the challenge that ...
Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interference
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied ComputingIn the context of systems security, information flows play a central role. Unhandled information flows potentially leave the door open to very dangerous types of attacks, such as code injection or sensitive information leakage. Information flows ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Jiannong Cao,
- Man Ho Au,
- Program Chairs:
- Mauro Conti,
- Nils Ole Tippenhauer
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 58Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in