Zobrazeno 1 - 6
of 6
pro vyhledávání: '"McCall, McKenna"'
Information flow type systems enforce the security property of noninterference by detecting unauthorized data flows at compile-time. However, they require precise type annotations, making them difficult to use in practice as much of the legacy infras
Externí odkaz:
http://arxiv.org/abs/2003.12819
To prevent applications from leaking users' private data to attackers, researchers have developed runtime information flow control (IFC) mechanisms. Most existing approaches are either based on taint tracking or multi-execution, and the same techniqu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d578e4fdf93a90e8fae001832e73a7c6
Autor:
McCall, McKenna
It is common for reactive systems like web services to collect personal information and/or perform sensitive tasks, making information flow control (IFC) in these applications particularly important. Most existing work on IFC in reactive systems does
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::34015fba2f135763f8bf51b72dac6827
Prior work has established that the attacker should not be allowed to influence what is declassified or when declassification occurs. Meanwhile, other work looks at protecting reactive systems from leaks due to dynamic features. They use secure multi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91344955a25781289d4593cba2f47ed0
Scripts on webpages could steal sensitive userdata. Much work has been done, both in modeling andimplementation, to enforce information flow control (IFC) ofwebpages to mitigate such attacks. It is common to modelscripts running in an IFC mechanism a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6161c14c981fec2e73871bf33b9c01dc
Autor:
McCall, McKenna, Shezan, Faysal Hossain, Bichhawat, Abhishek, Cobb, Camille, Jia, Limin, Tian, Yuan, Grace, Cooper, Yang, Mitchell
Home automation rules that allow users to connect smart home devices using trigger-action programs (TAP) can interact in subtle and unexpected ways. Determining whether these rules are free of undesirable behavior is challenging; so researchers have
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15c002e93a0be58ff1ef28905d1c2e00