Theoretical analysis of gate level information flow tracking (original) (raw)

On the Complexity of Generating Gate Level Information Flow Tracking Logic

Mohit Tiwari

IEEE Transactions on Information Forensics and Security, 2012

View PDFchevron_right

Theoretical Fundamentals of Gate Level Information Flow Tracking

Mohit Tiwari

IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 2011

View PDFchevron_right

Theorem proof based gate level information flow tracking for hardware security verification

maoyuan qin

Computers & Security, 2019

View PDFchevron_right

Tracking Information Flow at the Gate-Level for Secure Architectures

Mohit Tiwari

View PDFchevron_right

Gate-Level Information-Flow Tracking for Secure Architectures

Hassan Wassel

2010

View PDFchevron_right

An Improved Encoding Technique for Gate Level Information Flow Tracking

Ryan Kastner

2011

View PDFchevron_right

Complete information flow tracking from the gates up

Mohit Tiwari

Sigplan Notices, 2009

View PDFchevron_right

Modeling Secure Information Flow with Boolean Functions

Isabella Mastroeni

View PDFchevron_right

QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

Luca Hanel

2021 IEEE 39th International Conference on Computer Design (ICCD), 2021

View PDFchevron_right

A Theorem Proving Approach to Analysis of Secure Information Flow

Dave Sands

Security in Pervasive Computing, 2005

View PDFchevron_right

Hardware Implementation of Information Flow Signatures Derived via Program Analysis

Zbigniew Kalbarczyk

2000

View PDFchevron_right

Information Flow Secure Architectures

Hassan Wassel

2010

View PDFchevron_right

Achieving information flow security through monadic control of effects

William Harrison

Journal of Computer Security, 2009

View PDFchevron_right

Software-based gate-level information flow security for IoT systems

weidong Ye

Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, 2017

View PDFchevron_right

Two-bit pattern analysis for quantitative information flow

Ziyuan Meng

2014

View PDFchevron_right

Information Flow Analysis in Logical Form

Torben Amtoft

Static Analysis, 2004

View PDFchevron_right

Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

C Mu

2009 International Conference on Availability, Reliability and Security, 2009

View PDFchevron_right

Probabilistic Information Flow Security

Damas Gruska

Fundamenta Informaticae, 2008

View PDFchevron_right

A Formal Security Model for Microprocessor Hardware

Volker Kessler

IEEE Transactions on Software Engineering, 2000

View PDFchevron_right

A core calculus for secure hardware

William Harrison

Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design

View PDFchevron_right

A core calculus for secure hardware: its formal semantics and proof system

Tank Rey

Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, 2017

View PDFchevron_right

A security flow control algorithm and its denotational semantics correctness proof

Masaaki Mizuno

Formal Aspects of Computing, 1992

View PDFchevron_right

Output-Sensitive Information Flow Analysis

Cristian Ene

Formal Techniques for Distributed Objects, Components, and Systems, 2019

View PDFchevron_right

End-to-end verification of information-flow security for C and assembly programs

Ronghui Gu

Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2016

View PDFchevron_right

A Model-based Approach to Interdependency between Safety and Security in ICS

Chris Hankin

3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

View PDFchevron_right

Combining Different Proof Techniques for Verifying Information Flow Security

Tina Krausser

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Certified Abstract Non-Interference -- Object-Oriented Code Validation for Information Flow Security

Damiano Zanardini

2006

View PDFchevron_right

Securing Device Communication by Predicate Logic Specifications *

Temur Kutsia

2015

View PDFchevron_right

McSeVIC: A Model Checking Based Framework for Security Vulnerability Analysis of Integrated Circuits

Imran Abbasi

IEEE Access, 2018

View PDFchevron_right

Model Checking Information Flow

Michael Whalen

Design and Verification of Microprocessor Systems for High-Assurance Applications, 2010

View PDFchevron_right

A lattice model of secure information flow

Dorothy E Denning

Communications of the ACM, 1976

View PDFchevron_right

Design and Evaluation of Information Flow Signature for Secure Computation of Applications by Prateek Patel

prateek patel

2012

View PDFchevron_right

Information-Flow Attacks Based on Limited Observations

Damas Gruska

Lecture Notes in Computer Science, 2007

View PDFchevron_right