Secure Information Flow as a Safety Property, Formal Aspects in Security and Trust, 5th International Workshop, FAST, pp.20-34, 2008. ,
, Abstractions for Usable Information Flow Control in Aeolus, pp.139-151, 2012.
Combining symbolic and numerical domains for information leakage analysis, Trans. Computational Science, vol.31, pp.98-135, 2018. ,
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications, Verification, Model Checking, and Abstract Interpretation -16th International Conference, VMCAI 2015, pp.61-79, 2015. ,
Types as Abstract Interpretations, Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.316-331, 1997. ,
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. IACR Cryptology ePrint Archive, vol.193, 2017. ,
A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, pp.236-243, 1976. ,
Labels and event processes in the Asbestos operating system, Proceedings of the 20th ACM Symposium on Operating Systems Principles, pp.17-30, 2005. ,
, Hyperflow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security, pp.1583-1600, 2018.
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
On the equivalence of state-transition systems, Theory and Formal Methods, pp.171-182, 1993. ,
Information flow control for standard OS abstractions, Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp.321-334, 2007. ,
Fabric: Building open distributed systems securely by construction, Journal of Computer Security, vol.25, issue.4-5, pp.367-426, 2017. ,
Fabric: a platform for secure distributed computation and storage, Proceedings of the 22nd ACM Symposium on Operating Systems Principles, pp.321-334, 2009. ,
Dependent information flow types, Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.317-328, 2015. ,
Lagois Connections -a Counterpart to Galois Connections, Theor. Comput. Sci, vol.136, issue.1, pp.79-107, 1994. ,
Jflow: Practical mostly-static information flow control, POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.228-241, 1999. ,
Mostly-static decentralized information flow control, 1999. ,
Information Flow Inference for ML, ACM Trans. Program. Lang. Syst, vol.25, issue.1, pp.117-158, 2003. ,
Laminar: practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, pp.63-74, 2009. ,
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
IFDB: Decentralized Information Flow Control for Databases, Eighth Eurosys Conference 2013, EuroSys '13, pp.43-56, 2013. ,
A Sound Type System for Secure Flow Analysis, Journal of Computer Security, vol.4, issue.2/3, pp.167-188, 1996. ,
Security Typings by Abstract Interpretation, Static Analysis, 9th International Symposium, pp.360-375, 2002. ,
Making Information Flow Explicit in Histar, 7th Symposium on Operating Systems Design and Implementation (OSDI'06), pp.263-278, 2006. ,
Securing Distributed Systems with Information Flow Control, 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI, pp.293-308, 2008. ,
A Hardware Design Language for Timing-Sensitive Information-Flow Security, Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, pp.503-516, 2015. ,