Discretional Array Operations for Secure Information Flow

Author(s)

Abstract

Arrays \u00a0exist \u00a0in \u00a0many \u00a0nontrivial \u00a0programs. \u00a0Array \u00a0operations \u00a0can \u00a0cause \u00a0subtle \u00a0information \u00a0leaks. This \u00a0paper \u00a0allows \u00a0array \u00a0as \u00a0first-class \u00a0value \u00a0and \u00a0regards \u00a0discretional \u00a0array \u00a0as \u00a0array \u00a0of \u00a0array \u00a0by \u00a0alias \u00a0array. 2\u03c4 \u00a0 is \u00a0the Arrays \u00a0are \u00a0given \u00a0types \u00a0of \u00a0the \u00a0form security \u00a0class \u00a0of \u00a0the \u00a0array's \u00a0alias. \u00a0To \u00a0distinguish \u00a0array \u00a0from \u00a0its \u00a0alias, \u00a0we \u00a0propose \u00a0a \u00a0novel \u00a0binary \u00a0memory model [
About this article

Abstract View

  • 4051

Pdf View

  • 279