<--- Back to Details
First PageDocument Content
Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface
Date: 2018-09-27 23:32:05
Formal methods
Software engineering
Computing
Logic in computer science
Non-interference
Exception handling
Formal verification
Refinement
Thread
Futures and promises
Covert channel
Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

Add to Reading List

Source URL: unsat.cs.washington.edu

Download Document from Source Website

File Size: 408,14 KB

Share Document on Facebook

Similar Documents

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

DocID: 1uota - View Document

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

DocID: 1u9SC - View Document

How to cook a covert channel Techniques Simon Castro and Gray World Team  Difficulty

How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty

DocID: 1u2Yd - View Document

Sixth Annual Conference on Privacy, Security and Trust  A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

DocID: 1sdoX - View Document

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1rdk7 - View Document