Timing Aware Information Flow Security for a JavaCard-like Bytecode
Open Access
- 5 December 2005
- journal article
- Published by Elsevier in Electronic Notes in Theoretical Computer Science
- Vol. 141 (1) , 163-182
- https://doi.org/10.1016/j.entcs.2005.02.031
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Secure information flow and pointer con .nement in a java-like languagePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Information Flow Analysis for Java BytecodePublished by Springer Nature ,2005
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Eliminating covert flows with minimum typingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Information flow inference for MLPublished by Association for Computing Machinery (ACM) ,2002
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- A type system for Java bytecode subroutinesPublished by Association for Computing Machinery (ACM) ,1998
- A lattice model of secure information flowCommunications of the ACM, 1976
- A note on the confinement problemCommunications of the ACM, 1973