2012
DOI: 10.1007/978-3-642-35182-2_4
|View full text |Cite
|
Sign up to set email alerts
|

A Functional View of Imperative Information Flow

Abstract: Abstract. We analyze dynamic information-flow control for imperative languages in terms of functional computation. Specifically, we translate an imperative language to a functional language, thus accounting for the main difficulties of information-flow control in the imperative language.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 21 publications
(16 reference statements)
0
7
0
Order By: Relevance
“…In SAFE [29,34] we follow a different approach, enforcing noninterference using purely dynamic checks, for arbitrary binaries in a custom-designed instruction set. The mechanisms we use for this are similar to those found in recent work on purely dynamic IFC for high-level languages [1,4,5,6,7,40,41,44,45,63,72,75,78,83,86]; however, as far as we know, we are the first to push these ideas to the lowest level.…”
Section: Related Workmentioning
confidence: 64%
See 1 more Smart Citation
“…In SAFE [29,34] we follow a different approach, enforcing noninterference using purely dynamic checks, for arbitrary binaries in a custom-designed instruction set. The mechanisms we use for this are similar to those found in recent work on purely dynamic IFC for high-level languages [1,4,5,6,7,40,41,44,45,63,72,75,78,83,86]; however, as far as we know, we are the first to push these ideas to the lowest level.…”
Section: Related Workmentioning
confidence: 64%
“…Such tags representing IFC policies can involve arbitrary sets of principals, and principals themselves can be dynamically allocated to represent an unbounded number of entities within and outside the system. At the programming-language level, rich IFC policies have been extensively explored, with many proposed designs for static [43,67,68,73,77,96] and dynamic [4,5,6,7,40,44,72,75,78,86] enforcement mechanisms and a huge literature on their formal properties [43, 77, etc.]. Similarly, operating systems with information-flow tracking have been a staple of the OS literature for over a decade [36,54,55,66,97,97].…”
Section: Introductionmentioning
confidence: 99%
“…In SAFE [29,34] we follow a different approach, enforcing noninterference using purely dynamic checks, for arbitrary binaries in a custom-designed instruction set. The mechanisms we use for this are similar to those found in recent work on purely dynamic IFC for high-level languages [1,4,5,6,7,40,41,44,45,63,72,75,78,83,86]; however, as far as we know, we are the first to push these ideas to the lowest level.…”
Section: Related Workmentioning
confidence: 64%
“…Such tags representing IFC policies can involve arbitrary sets of principals, and principals themselves can be dynamically allocated to represent an unbounded number of entities within and outside the system. At the programming-language level, rich IFC policies have been extensively explored, with many proposed designs for static [43,67,68,73,77,96] and dynamic [4,5,6,7,40,44,72,75,78,86] enforcement mechanisms and a huge literature on their formal properties [43, 77, etc.]. Similarly, operating systems with information-flow tracking have been a staple of the OS literature for over a decade [36,54,55,66,97,97].…”
Section: Introductionmentioning
confidence: 99%
“…Flow-locks [5] extend information-flow typing with state-dependent conditions. Austin et al [34] describe dynamic IFC for imperative programs by translation to a lambda calculus. Secure multiexecution [35], [36] and faceted execution [37] are being explored as alternatives to monitoring by label-tracking.…”
Section: Related Workmentioning
confidence: 99%