Loading...
Please wait, while we are loading the content...
Similar Documents
Analysing Cryptographically-Masked Information Flows Using Slicing
| Content Provider | Semantic Scholar |
|---|---|
| Copyright Year | 2016 |
| Abstract | Whenever the architecture of a system allows untrusted application programs to access sensitive information, a technique must be provided to prevent such information from being “leaked” and becoming available to unauthorised entities. As a result, information flow control mechanisms are introduced, which allow to check the design of programs for security leaks and illegal influences of critical computations based on the system description. However, many information flow control mechanisms are either imprecise, which results in many false alarms, or are unable to handle cryptographic operations. Therefore, in this thesis a method for information flow control based on slicing is introduced for system descriptions that are specified in a MILS (Multiple Independent Levels of Security) variant of the Abstract Analysis and Design Language (AADL). The introduction itself is split into two parts: First, a slicing method for system descriptions without any cryptographic operations is introduced. Secondly, this basic method is extended such that cryptographicallymasked flows can be analysed by taking the “declassifying” effect of cryptography into account. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://moves.rwth-aachen.de/wp-content/uploads/thesisProjects/bsc-thesis-wachtmeister.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |