Tracing secure information flow through mode changes

نویسندگان

  • Colin J. Fidge
  • Tim McComb
چکیده

Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information through the device’s circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device’s distinct operating modes. However, such analyses overlook potential information flow between modes, via components that store information in one mode and release it in another. Here we show how graph-based analyses can be extended to allow for information flow through sequences of consecutive modes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Study of Kinematics and Dynamics of Oscillating Laminar Flow About a Cylinder

In this paper, the oscillating two-dimensional laminar flow about a cylinder and the oscillation of a cylinder in still water are studied. A finite volume method is applied to solve the Navier Stokes equations using SIMPLEC algorithm on a body fitted co-located O-type grid. In this study, the non-dimensional flow numbers, Keulegan-Carpenter and Stokes’ numbers are chosen over a range where diff...

متن کامل

The Study of Kinematics and Dynamics of Oscillating Laminar Flow About a Cylinder

In this paper, the oscillating two-dimensional laminar flow about a cylinder and the oscillation of a cylinder in still water are studied. A finite volume method is applied to solve the Navier Stokes equations using SIMPLEC algorithm on a body fitted co-located O-type grid. In this study, the non-dimensional flow numbers, Keulegan-Carpenter and Stokes’ numbers are chosen over a range where diff...

متن کامل

Flow Caml in a Nutshell

Flow Caml is an extension of the Objective Caml language with a type system tracing information flow. It automatically checks information flow within Flow Caml programs, then translates them to regular Objective Caml code that can be compiled by the ordinary compiler to produce secure programs. In this paper, we give a short overview of this system, from a practical viewpoint.

متن کامل

Secure Information Flow and Pointer Confinement in a Java-like Language

We consider a sequential object-oriented language with pointers and mutable state, private fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrained by security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure informat...

متن کامل

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006