Now showing items 1-5 of 5

    • Cryptographic Enforcement of Language-Based Information Erasure 

      Askarov, Aslan; Moore, Scott; Dimoulas, Christos; Chong, Stephen N (2015)
      Information erasure is a formal security requirement that stipulates when sensitive data must be removed from computer systems. In a system that correctly enforces erasure requirements, an attacker who observes the system ...
    • Global and Local Monitors to Enforce Noninterference in Concurrent Programs 

      Askarov, Aslan; Chong, Stephen N; Mantel, Heiko (2015)
      Controlling confidential information in concurrent systems is difficult, due to covert channels resulting from interaction between threads. This problem is exacerbated if threads share resources at fine granularity. In ...
    • Hybrid Monitors for Concurrent Noninterference 

      Askarov, Aslan; Chong, Stephen N; Mantel, Heiko (2015)
      Controlling confidential information in concurrent systems is difficult, due to covert channels resulting from interaction between threads. This problem is exacerbated if threads share resources at fine granularity. In ...
    • Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies 

      Askarov, Aslan; Chong, Stephen N (2012)
      In systems that handle confidential information, the security policy to enforce on information frequently changes: new users join the system, old users leave, and sensitivity of data changes over time. It is challenging, ...
    • Precise Enforcement of Progress-Sensitive Security 

      Moore, Scott David; Askarov, Aslan; Chong, Stephen N (ACM Press, 2012)
      Program progress (or termination) is a covert channel that may leak sensitive information. To control information leakage on this channel, semantic definitions of security should be progress sensitive and enforcement ...