Search For:

Displaying 1-19 out of 19 total
Securing Timeout Instructions in Web Applications
Found in: Computer Security Foundations Symposium, IEEE
By Alejandro Russo, Andrei Sabelfeld
Issue Date:July 2009
pp. 92-106
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class o...
 
Securing Interaction between Threads and the Scheduler
Found in: Computer Security Foundations Workshop, IEEE
By Alejandro Russo, Andrei Sabelfeld
Issue Date:July 2006
pp. 177-189
The problem of information flow in multithreaded programs remains an important open challenge. Existing approaches to specifying and enforcing information-flow security often suffer from over-restrictiveness, relying on non-standard semantics, lack of comp...
 
Dimensions and Principles of Declassification
Found in: Computer Security Foundations Workshop, IEEE
By Andrei Sabelfeld, David Sands
Issue Date:June 2005
pp. 255-269
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information releas...
 
Enforcing Robust Declassification
Found in: Computer Security Foundations Workshop, IEEE
By Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
Issue Date:June 2004
pp. 172
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive information as part of their correct functioning and therefore violate noninterferenc...
 
A Generic Approach to the Security of Multi-Threaded Programs
Found in: Computer Security Foundations Workshop, IEEE
By Heiko Mantel, Andrei Sabelfeld
Issue Date:June 2001
pp. 0126
Abstract: The security of computation at the level of a specific programming language and the security of complex systems at a more abstract level are two major areas of current security research. With the objective to integrate the two, this article propo...
 
Security of multithreaded programs by compilation
Found in: ACM Transactions on Information and System Security (TISSEC)
By Alejandro Russo, Andrei Sabelfeld, Andrei Sabelfeld, Gilles Barthe, Gilles Barthe, Tamara Rezk, Tamara Rezk
Issue Date:July 2010
pp. 1-32
End-to-End security of mobile code requires that the code neither intentionally nor accidentally propagates sensitive information to an adversary. Although mobile code is commonly multithreaded low-level code, there lack enforcement mechanisms that ensure ...
     
Securing Class Initialization in Java-like Languages
Found in: IEEE Transactions on Dependable and Secure Computing
By Willard Rafnsson,Keiko Nakata,Andrei Sabelfeld
Issue Date:January 2013
pp. 1-13
Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progress has been made on understanding information flow in object-oriented programs, little a...
 
Dynamic vs. Static Flow-Sensitive Security Analysis
Found in: Computer Security Foundations Symposium, IEEE
By Alejandro Russo, Andrei Sabelfeld
Issue Date:July 2010
pp. 186-199
This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static information-flow analysis is a natural generalization of flow-insensitive static analysi...
 
Tight Enforcement of Information-Release Policies for Dynamic Languages
Found in: Computer Security Foundations Symposium, IEEE
By Aslan Askarov, Andrei Sabelfeld
Issue Date:July 2009
pp. 43-59
This paper studies the problem of securing information release in dynamic languages. We propose (i) an intuitive framework for information-release policies expressing both what can be released by an application and where in the code this release may take p...
 
Gradual Release: Unifying Declassification, Encryption and Key Release Policies
Found in: Security and Privacy, IEEE Symposium on
By Aslan Askarov, Andrei Sabelfeld
Issue Date:May 2007
pp. 207-221
Information security has a challenge to address: enabling information-flow controls with expressive information release (or declassification) policies. Existing approaches tend to address some aspects of information release, exposing the other aspects for ...
 
Probabilistic Noninterference for Multi-Threaded Programs
Found in: Computer Security Foundations Workshop, IEEE
By Andrei Sabelfeld, David Sands
Issue Date:July 2000
pp. 200
We present a probability-sensitive confidentiality specification -- a form of probabilistic noninterference -- for a small multi-threaded programming language with dynamic thread creation. Probabilistic covert channels arise from a scheduler, which is prob...
 
Simple semantic analysis problems for functional programs (poster)
Found in: Proceedings of the second ACM SIGPLAN international conference on Functional programming (ICFP '97)
By Andrei Sabelfeld, Viktor Sabelfeld
Issue Date:June 1997
pp. 181-190
We examine the costs and benefits of a variety of copying garbage collection (GC) mechanisms across multiple architectures and programming languages. Our study covers both low-level object representation and copying issues as well as the mechanisms needed ...
     
Polyglots: crossing origins by crossing formats
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Andrei Sabelfeld, Jonas Magazinius, Billy K. Rios
Issue Date:November 2013
pp. 753-764
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a l...
     
GlassTube: a lightweight approach to web application integrity
Found in: Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS '13)
By Andrei Sabelfeld, Per A. Hallgren
Issue Date:June 2013
pp. 71-82
The HTTP and HTTPS protocols are the corner stones of the modern web. From a security point of view, they offer an all-or- nothing choice to web applications: either no security guarantees with HTTP or both confidentiality and integrity with HTTPS. How- ev...
     
Capabilities for information flow
Found in: Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security (PLAS '11)
By Alejandro Russo, Arnar Birgisson, Andrei Sabelfeld
Issue Date:June 2011
pp. 1-15
This paper presents a capability-based mechanism for permissive yet secure enforcement of information-flow policies. Language capabilities have been studied widely, and several popular implementations, such as Caja and Joe-E, are available. By making the c...
     
Limiting information leakage in event-based communication
Found in: Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security (PLAS '11)
By Andrei Sabelfeld, Willard Rafnsson
Issue Date:June 2011
pp. 1-16
Event-based communication is a major source of power and flexibility for today's applications. For example, in the context of a web browser, the dynamism of user experience is driven by events: fine-grained interaction of the user with a web application tr...
     
A lattice-based approach to mashup security
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Andrei Sabelfeld, Aslan Askarov, Jonas Magazinius
Issue Date:April 2010
pp. 15-23
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, the problem of securing information flow between mashup components becomes incr...
     
Catch me if you can: permissive yet secure error handling
Found in: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security (PLAS '09)
By Andrei Sabelfeld, Aslan Askarov
Issue Date:June 2009
pp. 1-22
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature exception constructs to provide some structure to error handling: for example, the...
     
Localized delimited release: combining the what and where dimensions of information release
Found in: Proceedings of the 2007 workshop on Programming languages and analysis for security (PLAS '07)
By Andrei Sabelfeld, Aslan Askarov
Issue Date:June 2007
pp. 53-60
Information release (or declassification) policies are the key challenge for language-based information security. Although much progress has been made, different approaches to information release tend to address different aspects of information release. In...
     
 1