A proof-producing machine-code analyzer for secure information flow
An approach enabling end-users to verify that a downloaded untrusted code will not leak confidential data to unauthorized parties is presented. The approach certifies RISC-style assembly programs for secure information flow by statically analyzing the code based on the idea of Proof Carrying Code (P...
| Main Authors: | Muthana, Abdulrahman Ahmad Abdu, Abd Ghani, Abdul Azim, Mahmod, Ramlan, Selamat, Mohd Hasan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2008
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68795/ http://psasir.upm.edu.my/id/eprint/68795/1/A%20proof-producing%20machine-code%20analyzer%20for%20secure%20information%20flow.pdf |
Similar Items
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Enhancing privacy of paging procedure in LTE
by: Muthana, Abdulrahman, et al.
Published: (2018)
by: Muthana, Abdulrahman, et al.
Published: (2018)
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
Public private partnership to produce future proof talents
by: Lee, Chong Hui
Published: (2020)
by: Lee, Chong Hui
Published: (2020)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Algorithm analyzer to check the efficiency of codes
by: Arvaree @ Alvar, Thamilvaani, et al.
Published: (2011)
by: Arvaree @ Alvar, Thamilvaani, et al.
Published: (2011)
Development of STEP-NC based machining system for machining
process information flow
by: Kassim, Noordiana, et al.
Published: (2013)
by: Kassim, Noordiana, et al.
Published: (2013)
Development of STEP-NC based machining system for machining process information flow
by: Kassim, Noordiana, et al.
Published: (2013)
by: Kassim, Noordiana, et al.
Published: (2013)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
Interactive proof systems
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Zero-knowledge-proof
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Background of zero-knowledge proof
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Security proof of improved-SARG04 protocol using the same four qubit states
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2010)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2010)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Error Proofing In Manufacturing.
by: Nadarajah, Sivakumar
Published: (2006)
by: Nadarajah, Sivakumar
Published: (2006)
Error Proofing In Manufacturing
by: Nadarajah, Sivakumar
Published: (2006)
by: Nadarajah, Sivakumar
Published: (2006)
Error Proofing In Manufacturing
by: Nadarajah, Sivakumar
Published: (2006)
by: Nadarajah, Sivakumar
Published: (2006)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Managing rail infrastructure for a digital future: Future-proofing of asset information
by: Love, Peter, et al.
Published: (2018)
by: Love, Peter, et al.
Published: (2018)
Future proofing PPPs: Life-cycle performance measurement and Building Information Modelling
by: Love, Peter, et al.
Published: (2015)
by: Love, Peter, et al.
Published: (2015)
A reviewing approach to analyze the advancements of error detection and correction codes in channel coding with emphasis on lpwan and iot systems
by: Ali, Muhammad Moazzam, et al.
Published: (2023)
by: Ali, Muhammad Moazzam, et al.
Published: (2023)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Datatype-generic termination proofs
by: Backhouse, Roland, et al.
Published: (2008)
by: Backhouse, Roland, et al.
Published: (2008)
An Architecture for Proof Planning Systems
by: Dennis, Louise Abigail
Published: (2005)
by: Dennis, Louise Abigail
Published: (2005)
Proof Methods for Corecursive Programs
by: Hutton, Graham, et al.
Published: (2005)
by: Hutton, Graham, et al.
Published: (2005)
Burdens of proof and the case for unevenness
by: Aijaz, Imran, et al.
Published: (2013)
by: Aijaz, Imran, et al.
Published: (2013)
No proof vaccine linked to deaths
by: Krishnan, Dhesegaran Bala
Published: (2021)
by: Krishnan, Dhesegaran Bala
Published: (2021)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
A study on the effect of the flow rate on the power produced by the pico hydropower
by: Wan Mohamad Azam, Wan Mahmod
Published: (2013)
by: Wan Mohamad Azam, Wan Mahmod
Published: (2013)
A case study to identify quality attributes relationships for web-based applications
by: Zulzalil, Hazura, et al.
Published: (2008)
by: Zulzalil, Hazura, et al.
Published: (2008)
Multi-criteria evaluation in website quality determination
by: Zulzalil, Hazura, et al.
Published: (2012)
by: Zulzalil, Hazura, et al.
Published: (2012)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Similar Items
-
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008) -
Enhancing privacy of paging procedure in LTE
by: Muthana, Abdulrahman, et al.
Published: (2018) -
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013) -
Coding, cryptography, information security and OFDM
Published: (2011) -
Topics in coding, cryptography and information security
Published: (2011)