2010
DOI: 10.1007/978-3-642-15257-3_16
|View full text |Cite
|
Sign up to set email alerts
|

On-the-fly Inlining of Dynamic Security Monitors

Abstract: Abstract. Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that inclu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…Magazinius et al [31] show how to perform informationflow monitor inlining on the fly: security checks are injected as the computation goes along. They consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Magazinius et al [31] show how to perform informationflow monitor inlining on the fly: security checks are injected as the computation goes along. They consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Some perform static pre-analyzes, i.e., before the execution [13,21,25], or code inlining [12,6,23,29]. In other cases, the static analysis is triggered at runtime by the monitor [22,32,27,19].…”
Section: S-ifmentioning
confidence: 99%
“…There are several approaches to hybrid enforcement: inlining monitors [12,6,23,29], selective tracking [13,25], and the application of a static analysis at branch points [22,32,27,19]. Value sensitivity is particularly suitable for the latter to reduce the number of upgrades and increase precision (cf.…”
Section: Related Workmentioning
confidence: 99%
“…Magazinius et al [28] cope with dynamic code evaluation instructions by inlining on-the-fly. Dynamic code evaluation instructions are rewritten to make use of auxiliary functions that, when invoked at runtime, inject security checks into the available string.…”
Section: Related Workmentioning
confidence: 99%