• Publications
  • Influence
Probabilistic noninterference for multi-threaded programs
TLDR
We present a probability-sensitive confidentiality specification-a form of probabilistic noninterference-for a small multi-threaded programming language with dynamic thread creation. Expand
  • 343
  • 36
  • PDF
On flow-sensitive security types
TLDR
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple programs. Expand
  • 252
  • 29
  • PDF
Declassification: Dimensions and principles
TLDR
We provide a road map of the main directions of current research, by classifying the basic goals according to what information is released, who releases information, where in the systeminformation is released and when information can be released. Expand
  • 256
  • 26
  • PDF
Dimensions and principles of declassification
TLDR
We provide a road map of the main directions of current research, by classifying the basic goals according to what information is released, who releases information, where in the system information isreleased, and when information can be released. Expand
  • 301
  • 19
  • PDF
Termination-Insensitive Noninterference Leaks More Than Just a Bit
TLDR
In this paper we develop a definition of termination-insensitive noninterference suitable for reasoning about programs with outputs. Expand
  • 193
  • 19
  • PDF
Improvement in a lazy context: an operational theory for call-by-need
TLDR
In this article we present an operational theory for call-by-need, based upon an improvement ordering on programs: M is improved by N if in all program-contexts C, when C terminates then C[N] terminates at least as cheaply. Expand
  • 92
  • 17
  • PDF
A Theorem Proving Approach to Analysis of Secure Information Flow
TLDR
We investigate the feasibility of this approach by showing how a general purpose tool for software verification (based on dynamic logic) can be used to perform information flow analyses. Expand
  • 214
  • 14
  • PDF
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designed third-party code.Expand
  • 122
  • 12
  • PDF
A Per Model of Secure Information Flow in Sequential Programs
TLDR
This paper proposes an extensional semantics-based formal specification of secure information-flow properties in sequential programs based on representing degrees of security by partial equivalence relations (pers). Expand
  • 167
  • 11
Observable Sharing for Functional Circuit Description
TLDR
We propose an extension to Haskell to solve a standard problem when manipulating data types representing circuits in a lazy functional language which makes graph sharing observable. Expand
  • 100
  • 9
...
1
2
3
4
5
...