Search for dissertations about: "runtime enforcement"

Showing result 1 - 5 of 12 swedish dissertations containing the words runtime enforcement.

  1. 1. Information Erasure: An Information-Flow Approach to Semantics and Enforcement

    Author : Filippo Del Tedesco; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; erasure policies; erasure; information flow; enforcement; Python; security;

    Abstract : Many modern online services require sensitive data to complete their tasks. For this reason, guaranteeing security policies in such services is a major concern. The traditional (and well studied) aspects of security, namely confidentiality, integrity, and availability of data, capture many but not all desirable policies involving sensitive-data. READ MORE

  2. 2. Securing functional programs with floating-label information-flow control

    Author : Pablo Buiras; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; covert timing channels; LIO; concurrency; type-level programming; floating-label; Haskell; internal timing; dynamic enforcement; DC labels; dynamic policies; lazy evaluation; information-flow control; cache-based attacks; language-based security; hybrid enforcement; flow-sensitivity; functional programming; privileges;

    Abstract : The work presented in this thesis focuses on information-flow control systems for functional programs, particularly on the LIO library in Haskell. The thesis considers threemain aspects in this area: timing covert channels, dynamic policies andenforcement mechanisms that improve precision of the analysis. READ MORE

  3. 3. Securing Interactive Systems

    Author : Willard Thor Rafnsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; program analysis; concurrency; multi-threading; covert channels; semantics-based security; language-based security; information-flow security; runtime enforcement; parallelism; scheduling; program transformation; information-flow control; fairness;

    Abstract : This thesis provides means to achieve end-to-end information-flow security in interactive systems. The elusiveness of this problem stems from the fact that interaction patterns, primitives, synchronous communication and nondeterminism combine in ways where seemingly innocuous systems compromise security in unexpected ways under interaction. READ MORE

  4. 4. Inlined Reference Monitors : Certification,Concurrency and Tree Based Monitoring

    Author : Andreas Lundblad; Mads Dam; Gul Agha; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Runtime monitoring; policy enforcement; tree automata; monitor inlining; certification; concurrency;

    Abstract : Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). READ MORE

  5. 5. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software

    Author : Phu Phung; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; security policy enforcement; JavaScript security; web-application security; vehicle software security; untrusted software;

    Abstract : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. READ MORE