Discretional Array Operations for Secure Information Flow

Full PDF

Authors

Abstract

Arrays \u00a0exist \u00a0in \u00a0many \u00a0nontrivial \u00a0programs. \u00a0Array \u00a0operations \u00a0can \u00a0cause \u00a0subtle \u00a0information \u00a0leaks. This \u00a0paper \u00a0allows \u00a0array \u00a0as \u00a0first-class \u00a0value \u00a0and \u00a0regards \u00a0discretional \u00a0array \u00a0as \u00a0array \u00a0of \u00a0array \u00a0by \u00a0alias \u00a0array. 2\u03c4 \u00a0 is \u00a0the Arrays \u00a0are \u00a0given \u00a0types \u00a0of \u00a0the \u00a0form security \u00a0class \u00a0of \u00a0the \u00a0array's \u00a0alias. \u00a0To \u00a0distinguish \u00a0array \u00a0from \u00a0its \u00a0alias, \u00a0we \u00a0propose \u00a0a \u00a0novel \u00a0binary \u00a0memory model [
About this article

Abstract View

Pdf View