DOI: 10.3990/1.9789036536523
|View full text |Cite
|
Sign up to set email alerts
|

Qualitative and quantitative information flow analysis for multi-threaded programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 109 publications
(227 reference statements)
0
6
0
Order By: Relevance
“…To our knowledge, no other evaluations of BOD have been published and we cannot perform a quantitative comparison of our implementation to other algorithms. However, we compare our approach to a closely related work that has been done by Ngo [32]. Ngo discusses the SmithVolpano program as a case study for his work on observational determinism.…”
Section: Complexity Of the Algorithmmentioning
confidence: 99%
“…To our knowledge, no other evaluations of BOD have been published and we cannot perform a quantitative comparison of our implementation to other algorithms. However, we compare our approach to a closely related work that has been done by Ngo [32]. Ngo discusses the SmithVolpano program as a case study for his work on observational determinism.…”
Section: Complexity Of the Algorithmmentioning
confidence: 99%
“…Example. Consider the following program from [14]: Therefore, the divergence stutter bisimulation quotient of it is computed as depicted in Figure 2. Since the initial state s 0 of KS and the initial state st 0 of KST are not in the same equivalence class, the program is labelled as insecure.…”
Section: Verification Of Observational Determinismmentioning
confidence: 99%
“…The problem is borrowed from [11] to show how an attacker can deduce secret information through probabilistic leaks. David Chaum first proposed this problem in 1988 as an example of anonymity and identity hiding [23].…”
Section: Case Studymentioning
confidence: 99%
“…Consequently, algorithmic verification has been favored recently, which is the application of rigorous, mathematically sound, and fully automatic techniques to the analysis of systems. These techniques are more flexible than type systems, and give a precise and efficient mechanism to verify a variety of security properties, without the need to prove soundness repeatedly [11].…”
Section: B Backgroundmentioning
confidence: 99%
See 1 more Smart Citation