End-to-end verification of information-flow security for C and assembly programs.
David CostanzoZhong ShaoRonghui GuPublished in: PLDI (2016)
Keyphrases
- end to end
- information flow
- information security
- flow analysis
- social networks
- information flows
- congestion control
- communication networks
- multipath
- admission control
- ad hoc networks
- wireless ad hoc networks
- model checking
- scalable video
- supply chain
- databases
- flow graph
- network security
- smart card
- intrusion detection