Learn More
The root cause for <i>confidentiality</i> and <i>integrity</i> attacks against computing systems is insecure <i>information flow</i>. The complexity of modern systems poses a major challenge to secure <i>end-to-end</i> information flow, ensuring that the insecurity of a single component does not render the entire system insecure. While information flow in a(More)
Modern web and mobile applications are complex entities amalgamating different languages, components, and platforms. The rich features span the application tiers and components, some from third parties, and require substantial efforts to ensure that the insecurity of a single component does not render the entire system insecure. As of today, the majority of(More)
Research in information-flow security aims at developing methods to identify undesired information leaks within programs from private (high) sources to public (low) sinks. For a concurrent system, it is desirable to have compositional analysis methods that allow for analyzing each thread independently and that nevertheless guarantee that the parallel(More)
  • 1