Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Pablo Buiras"'
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 81, Iss Proc. LSFA 2011, Pp 16-29 (2012)
The linear-algebraic lambda-calculus and the algebraic lambda-calculus are untyped lambda-calculi extended with arbitrary linear combinations of terms. The former presents the axioms of linear algebra in the form of a rewrite system, while the latter
Externí odkaz:
https://doaj.org/article/697badaa545a4c0cbbc44d7a0dec65b8
Publikováno v:
MICRO
Observational models enable the analysis of information flow properties against side channels. Relational testing has been used to validate the soundness of these models by measuring the side channel on states that the model considers indistinguishab
Publikováno v:
Computer Aided Verification ISBN: 9783030532871
CAV (1)
CAV (1)
Observational models make tractable the analysis of information flow properties by providing an abstraction of side channels. We introduce a methodology and a tool, Scam-V, to validate observational models for modern computer architectures. We combin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::936c624027d6e8046949d81bd7bf8ecf
https://doi.org/10.1007/978-3-030-53288-8_12
https://doi.org/10.1007/978-3-030-53288-8_12
Fuzzing is a popular technique to find flaws in programs using invalid or erroneous inputs but not without its drawbacks. At one hand, mutational fuzzers require a set of valid inputs as a starting point, in which modifications are then introduced. O
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0d7e164f2de471f180765a5f3731fe4c
https://www.sciencedirect.com/science/article/pii/S0164121217302066
https://www.sciencedirect.com/science/article/pii/S0164121217302066
We present Clio, an information flow control (IFC) system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage. Clio insulates developers from explicitly manipulating keys and cryptograph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71f2ee26afacf08bd92b44a8c7a2e237
Publikováno v:
Haskell
Fuzzing is a technique that involves testing programs using invalid or erroneous inputs. Most fuzzers require a set of valid inputs as a starting point, in which mutations are then introduced. QuickFuzz is a fuzzer that leverages QuickCheck-style ran
Publikováno v:
Haskell
We present a small extension to Haskell called the Key monad. With the Key monad, unique keys of different types can be created and can be tested for equality. When two keys are equal, we also obtain a concrete proof that their types are equal. This
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457437
ESORICS (1)
ESORICS (1)
The programming language Haskell plays a unique, privileged role in Information-Flow Control (IFC) research: it is able to enforce information security via libraries. Many state-of-the-art libraries (e.g., LIO, HLIO, and MAC) allow computations to ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bb178fee4dfa288f47ab6699b8ff48b
https://doi.org/10.1007/978-3-319-45744-4_27
https://doi.org/10.1007/978-3-319-45744-4_27
Publikováno v:
ICFP
Information-Flow Control (IFC) is a well-established approach for allowing untrusted code to manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and static analyses or via dynamic execution monitors. The LIO Ha
Autor:
Bart van Delft, Pablo Buiras
Publikováno v:
PLAS@ECOOP
This paper presents SLIO, an information-flow control mechanism enforcing dynamic policies: security policies which change the relation between security levels while the system is running. SLIO builds on LIO, a floating-label information-flow control