IEEE Transactions on Software Engineering
Theoretical Computer Science
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Principles of Program Analysis
Principles of Program Analysis
ACM Transactions on Programming Languages and Systems (TOPLAS)
A bisimulation method for cryptographic protocols
Nordic Journal of Computing
ESOP '02 Proceedings of the 11th European Symposium on Programming Languages and Systems
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Abstract interpretation of mobile ambients
Science of Computer Programming - Special issue on static analysis (SAS'99)
Information Flow Analysis in a Discrete-Time Process Algebra
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Analysis and Automatic Detection of Information Flows in Systems and Networks (PhD Thesis)
Analysis and Automatic Detection of Information Flows in Systems and Networks (PhD Thesis)
Equational properties of mobile ambients
Mathematical Structures in Computer Science
On abstract interpretation of mobile ambients
Information and Computation
BioAmbients: an abstraction for biological compartments
Theoretical Computer Science - Special issue: Computational systems biology
BANANA: a tool for boundary ambients nesting analysis
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Behavioural typing for safe ambients
Computer Languages, Systems and Structures
Security boundaries in mobile ambients
Computer Languages, Systems and Structures
Nesting analysis of mobile ambients
Computer Languages, Systems and Structures
Information leakage analysis by abstract interpretation
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
SAILS: static analysis of information leakage with sample
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Engineering adaptive privacy: on the role of privacy awareness requirements
Proceedings of the 2013 International Conference on Software Engineering
Hi-index | 0.00 |
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data. In this setting, absence of direct information leakage is granted as soon as the initial process satisfies some syntactic conditions. We then give a new notion of non-interference for Boundary Ambients aiming at capturing indirect flows, too. We design a Control Flow Analysis that computes an over-approximation of all ambients that may be affected at run-time by high-level data and we show that this static analysis can be used to enforce non-interference, i.e., to statically detect that no (direct or indirect) information leakage is ever possible at run-time.