• JFlow

  • Referenced in 24 articles [sw20595]
  • JFlow: practical mostly-static information flow control. A promising technique for protecting privacy and integrity ... sensitive data is to statically check information flow within programs that manipulate the data. While ... Java language that adds statically-checked information flow annotations. JFlow provides several new features that ... make information flow checking more flexible and convenient than in previous models: a decentralized label...
  • Jif

  • Referenced in 16 articles [sw16478]
  • Java information flow. Jif is a security-typed programming language that extends Java with support ... information flow control and access control, enforced at both compile time and run time...
  • Paragon

  • Referenced in 8 articles [sw13306]
  • Paragon for practical programming with information-flow control. Conventional security policies for software applications ... practice we believe that such control -- information flow control -- is needed to manage ... class support for static checking of information flow control policies. Paragon policies are specified ... those used in previous languages with information-flow support.par Our contribution is to present...
  • TyPiCal

  • Referenced in 8 articles [sw23207]
  • deadlock-freedom analysis, useless-code elimination, information flow analysis, and termination analysis. The former ... other tools such as model checkers). Information flow analyzer checks whether a process leaks information...
  • Flow Caml

  • Referenced in 6 articles [sw08923]
  • prototype implementation of an information flow analyzer for the Caml language. It has been publicly ... OCaml with a type system tracing information flow. Its purpose is basically to allow ... obey some confidentiality or integrity policy. In Flow Caml, standard ML types are annotated with ... requiring source code annotations, that every information flow caused by the analyzed program is legal...
  • Merlin

  • Referenced in 3 articles [sw23076]
  • Merlin: specification inference for explicit information flow problems. The last several years have seen ... violations that are caused by explicit information flow in programs. Much of this interest ... injection. In fact, these explicit information flow vulnerabilities commonly found in Web applications now outnumber ... approach for automatically inferring explicit information flow specifications from program code. Such specifications greatly reduce...
  • Quantomatic

  • Referenced in 11 articles [sw10107]
  • composition as the “wiring”, or flow of information. This is especially true when describing quantum...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. Computer security ... software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis ... range of security attacks. However, current information flow tracking systems are not very practical, because ... proposes a low overhead, software-only information flow tracking system, called LIFT, which minimizes...
  • TAJ

  • Referenced in 6 articles [sw33114]
  • applications. Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods...
  • TaintDroid

  • Referenced in 6 articles [sw26740]
  • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Today’s smartphone ... instances of potential misuse of users’ private information across 20 applications. Monitoring sensitive data with...
  • Fable

  • Referenced in 6 articles [sw23081]
  • security policies, including access control, information flow, provenance, and security automata. We have implemented Fable...
  • Aglet

  • Referenced in 4 articles [sw13305]
  • express and enforce access control and information flow policies. In this paper, we show that ... dynamic policies, authentication, spatial distribution, and information flow. The implementation of Aglet consists...
  • Laminar

  • Referenced in 3 articles [sw23077]
  • Laminar: practical fine-grained decentralized information flow control. Decentralized information flow control (DIFC ... inefficient at monitoring the flow of information through fine-grained program data structures. This paper ... first system to implement decentralized information flow control using a single set of abstractions...
  • QuickChick

  • Referenced in 5 articles [sw13283]
  • complex case study on testing an information-flow control abstract machine, demonstrating that our verification...
  • SeLINQ

  • Referenced in 2 articles [sw28379]
  • attacks against computing systems is insecure information flow. The complexity of modern systems poses ... challenge to secure end-to-end information flow, ensuring that the insecurity of a single ... render the entire system insecure. While information flow in a variety of languages and settings ... framework for uniform tracking of information flow through both the application and the underlying database...
  • HLIO

  • Referenced in 3 articles [sw22611]
  • mixing static and dynamic typing for information-flow control in Haskell. Information-Flow Control...
  • RTransferEntropy

  • Referenced in 3 articles [sw29816]
  • package RTransferEntropy: Measuring Information Flow Between Time Series with Shannon and Renyi Transfer Entropy. Measuring ... information flow between time series with Shannon and Rényi transfer entropy. See also Dimpfl...
  • Jakstab

  • Referenced in 4 articles [sw25254]
  • growing control flow graph. Data flow information is used to resolve branch targets and discover ... together with the main control flow reconstruction to improve precision of the disassembly, or they...
  • LUSTRE

  • Referenced in 38 articles [sw08938]
  • time programming. LUSTRE is a synchronous data-flow language for programming systems which interact with ... their environments in real-time. After an informal presentation of the language, we describe...
  • SIFA

  • Referenced in 2 articles [sw01350]
  • describe a tool for analysing information flow in security hardware. It identifies both sub-circuits ... well as the potential for information flow due to hardware failure. The tool allows...