Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security 2016
DOI: 10.1145/2993600.2993608
|View full text |Cite
|
Sign up to set email alerts
|

On Formalizing Information-Flow Control Libraries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…For instance, when adding file operations, both fine-(e.g., [Broberg et al 2013]) and coarse-grained (e.g., [Efstathopoulos et al 2005;Krohn et al 2007;Russo et al 2009;Stefan et al 2011]) enforcements are likely to assign a single flow-insensitive label to each file in order to denote the sensitivity of its content. Then, those features could be handled flow-insensitively in both systems (e.g., Pottier and Simonet 2003;Stefan et al 2011;Vassena and Russo 2016]), in a manner similar to what we have just shown for references in…”
Section: Dynamicsmentioning
confidence: 91%
“…For instance, when adding file operations, both fine-(e.g., [Broberg et al 2013]) and coarse-grained (e.g., [Efstathopoulos et al 2005;Krohn et al 2007;Russo et al 2009;Stefan et al 2011]) enforcements are likely to assign a single flow-insensitive label to each file in order to denote the sensitivity of its content. Then, those features could be handled flow-insensitively in both systems (e.g., Pottier and Simonet 2003;Stefan et al 2011;Vassena and Russo 2016]), in a manner similar to what we have just shown for references in…”
Section: Dynamicsmentioning
confidence: 91%
“…While the technicalities of this technique and ours differ, both are based on the same core intuition. One advantage of the erasure technique is its applicability to non-terminating or partial programs in proofs of Termination Sensitive Noninterference and Progress Sensitive Noninterference [Vassena and Russo 2016]. We are unsure how well parametricity extends to this setting.…”
Section: Implementation In Haskellmentioning
confidence: 99%
“…In Sect. 5.1, we describe our proof technique based on term erasure, which has been used to verify security guarantees of functional programming languages [30], IFC libraries [8,17,54,56,61], and an IFC runtime system [59]. In Sect.…”
Section: Security Guaranteesmentioning
confidence: 99%