Gate-Level Information Flow Tracking for Security Lattices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Encoding Technique for Gate Level Information Flow Tracking

High-assurance systems, such as flight control and banking systems require strict guarantees on information flows or else face catastrophic consequences. Information flow tracking (IFT) is a frequently used security measure for preventing unintended information flows in such systems. Recently, Gate Level Information Flow Tracking (GLIFT) has been proposed to track information flows at the hardw...

متن کامل

Tracking Information Flow at the Gate-Level for Secure Architectures

Many critical systems require tight guarantees on the flow of information, for example when handling secret cryptographic keys or critical avionics data. Unfortunately, even understanding the true flow of information through a traditional processor is difficult because executing an instruction affects so much internal state: the program counter, the memory system, forwarding and pipeline logic,...

متن کامل

Dynamic Tracking of Information Flow Signatures for Security Checking

Memory-based attacks represent one of the largest attack classes in the field. Many techniques have been proposed to protect applications from certain classes of memory exploits, however, few of these techniques can protect the application from all memory attacks, and few permit the protection of only select variables. We present a technique to provide protection of select variables from a wide...

متن کامل

A Low-Overhead, Value-Tracking Approach to Information Flow Security

We present a hybrid approach to information flow security where security violations are detected at execution time. We track secure values and secure locations at run time to prevent problems such as password disclosure in C programs. This analysis is safe in the presence of pointer aliasing. Such problems are hard to solve using static analysis (or lead to many false positives). Our technique ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Design Automation of Electronic Systems

سال: 2014

ISSN: 1084-4309,1557-7309

DOI: 10.1145/2676548