Integrating hardware and software information flow analyses
نویسندگان
چکیده
منابع مشابه
SHIFT+M: Software-Hardware Information Flow Tracking on Multi-core
We designed, implemented and analyzed three distributed protocols for information-flow tracking on a multi-core message-passing architecture. In each we used Asbestos style labels to provide protection from unauthorized communication. The protocols remove the reliance on a central repository for taint checking by adding a trusted library and hardware mechanisms at each core. We modeled the hard...
متن کاملSeamlessly Integrating Software & Hardware Modelling for Large-Scale Systems
Large-scale systems increasingly consist of a mixture of co-dependent software and hardware. The differing nature of software and hardware means that they are often modelled separately and with different approaches. This can cause failures later in development during the integration of software and hardware designs, due to incompatible assumptions of software/hardware interactions. This paper p...
متن کاملIntegrating communication protocol selection with hardware/software codesign
This paper explores the problem of determining the characteristics of the communication links in a computer system as well as determining the best functional partitioning. In particular, we present a communication estimation model and show, by the use of this model, the importance of integrating communication protocol selection with hardware/software partitioning. The communication estimation m...
متن کاملAnalyses, Hardware/Software Compilation, Code Optimization for Complex Applications
LIP UMR CNRS / ENS Lyon / UCB Lyon 1 / INRIA 69007 Lyon E-mail : Christophe [email protected], [email protected] The advent of parallelism in supercomputers, in embedded systems (smartphones, plane controllers), and in more classical end-user computers increases the need for high-level code optimization and improved compilers. Being able to deal with the complexity of the upcoming softw...
متن کاملConfidentiality Enforcement Using Dynamic Information Flow Analyses
With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of str...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGPLAN Notices
سال: 2009
ISSN: 0362-1340,1558-1160
DOI: 10.1145/1543136.1542474