Tracing secure information flow through mode changes
نویسندگان
چکیده
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information through the device’s circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device’s distinct operating modes. However, such analyses overlook potential information flow between modes, via components that store information in one mode and release it in another. Here we show how graph-based analyses can be extended to allow for information flow through sequences of consecutive modes.
منابع مشابه
The Study of Kinematics and Dynamics of Oscillating Laminar Flow About a Cylinder
In this paper, the oscillating two-dimensional laminar flow about a cylinder and the oscillation of a cylinder in still water are studied. A finite volume method is applied to solve the Navier Stokes equations using SIMPLEC algorithm on a body fitted co-located O-type grid. In this study, the non-dimensional flow numbers, Keulegan-Carpenter and Stokes’ numbers are chosen over a range where diff...
متن کاملThe Study of Kinematics and Dynamics of Oscillating Laminar Flow About a Cylinder
In this paper, the oscillating two-dimensional laminar flow about a cylinder and the oscillation of a cylinder in still water are studied. A finite volume method is applied to solve the Navier Stokes equations using SIMPLEC algorithm on a body fitted co-located O-type grid. In this study, the non-dimensional flow numbers, Keulegan-Carpenter and Stokes’ numbers are chosen over a range where diff...
متن کاملFlow Caml in a Nutshell
Flow Caml is an extension of the Objective Caml language with a type system tracing information flow. It automatically checks information flow within Flow Caml programs, then translates them to regular Objective Caml code that can be compiled by the ordinary compiler to produce secure programs. In this paper, we give a short overview of this system, from a practical viewpoint.
متن کاملSecure Information Flow and Pointer Confinement in a Java-like Language
We consider a sequential object-oriented language with pointers and mutable state, private fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrained by security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure informat...
متن کاملModified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006