Model checking
Counterexample-guided abstraction refinement for symbolic model checking
Journal of the ACM (JACM)
Tracing secure information flow through mode changes
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Information Flow Analysis for Fail-Secure Devices
The Computer Journal
SIFA: a tool for evaluation of high-grade security devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Integrating hardware and software information flow analyses
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
Development of Security Software: A High Assurance Methodology
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Hi-index | 0.00 |
The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.