Specifying the mode logic of a flight guidance system in CoRE and SCR
FMSP '98 Proceedings of the second workshop on Formal methods in software practice
Using the Common Criteria for It Security Evaluation
Using the Common Criteria for It Security Evaluation
FTRTFT '96 Proceedings of the 4th International Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems
Information Flow Analysis for Fail-Secure Devices
The Computer Journal
SIFA: a tool for evaluation of high-grade security devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Product flow analysis in distribution networks with a fixed time horizon
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Verifying abstract information flow properties in fault tolerant security devices
ICFEM'06 Proceedings of the 8th international conference on Formal Methods and Software Engineering
Hi-index | 0.00 |
Communications devices intended for use in security-critical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information through the device's circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device's distinct operating modes. However, such analyses overlook potential information flow between modes, via components that store information in one mode and release it in another. Here we show how graph-based analyses can be extended to allow for information flow through sequences of consecutive modes.