Discretional Array Operations for Secure Information Flow
Abstract
Arrays \u00a0exist \u00a0in \u00a0many \u00a0nontrivial \u00a0programs. \u00a0Array \u00a0operations \u00a0can \u00a0cause \u00a0subtle \u00a0information \u00a0leaks. This \u00a0paper \u00a0allows \u00a0array \u00a0as \u00a0first-class \u00a0value \u00a0and \u00a0regards \u00a0discretional \u00a0array \u00a0as \u00a0array \u00a0of \u00a0array \u00a0by \u00a0alias \u00a0array. 2\u03c4 \u00a0 is \u00a0the Arrays \u00a0are \u00a0given \u00a0types \u00a0of \u00a0the \u00a0form security \u00a0class \u00a0of \u00a0the \u00a0array's \u00a0alias. \u00a0To \u00a0distinguish \u00a0array \u00a0from \u00a0its \u00a0alias, \u00a0we \u00a0propose \u00a0a \u00a0novel \u00a0binary \u00a0memory model [Downloads
Published
1970-01-01
Abstract View
- 3961
Pdf View
- 242
Issue
Section
Articles