Discretional Array Operations for Secure Information Flow

Authors

Abstract

Arrays \u00a0exist \u00a0in \u00a0many \u00a0nontrivial \u00a0programs. \u00a0Array \u00a0operations \u00a0can \u00a0cause \u00a0subtle \u00a0information \u00a0leaks. This \u00a0paper \u00a0allows \u00a0array \u00a0as \u00a0first-class \u00a0value \u00a0and \u00a0regards \u00a0discretional \u00a0array \u00a0as \u00a0array \u00a0of \u00a0array \u00a0by \u00a0alias \u00a0array. 2\u03c4 \u00a0 is \u00a0the Arrays \u00a0are \u00a0given \u00a0types \u00a0of \u00a0the \u00a0form security \u00a0class \u00a0of \u00a0the \u00a0array's \u00a0alias. \u00a0To \u00a0distinguish \u00a0array \u00a0from \u00a0its \u00a0alias, \u00a0we \u00a0propose \u00a0a \u00a0novel \u00a0binary \u00a0memory model [

Downloads

Published

1970-01-01

Abstract View

  • 3961

Pdf View

  • 242

Issue

Section

Articles