Discretional Array Operations for Secure Information Flow
Abstract
Arrays \u00a0exist \u00a0in \u00a0many \u00a0nontrivial \u00a0programs. \u00a0Array \u00a0operations \u00a0can \u00a0cause \u00a0subtle \u00a0information \u00a0leaks. This \u00a0paper \u00a0allows \u00a0array \u00a0as \u00a0first-class \u00a0value \u00a0and \u00a0regards \u00a0discretional \u00a0array \u00a0as \u00a0array \u00a0of \u00a0array \u00a0by \u00a0alias \u00a0array. 2\u03c4 \u00a0 is \u00a0the Arrays \u00a0are \u00a0given \u00a0types \u00a0of \u00a0the \u00a0form security \u00a0class \u00a0of \u00a0the \u00a0array's \u00a0alias. \u00a0To \u00a0distinguish \u00a0array \u00a0from \u00a0its \u00a0alias, \u00a0we \u00a0propose \u00a0a \u00a0novel \u00a0binary \u00a0memory model [About this article
Abstract View
- 4051
Pdf View
- 279