Information flow analysis

N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Software systems are becoming increasingly trusted to handle sensitive information, though they have the potential to abuse this trust with serious consequences. in particular if they are connected to the internet. We allow web browsers to access our bank accounts, but also allow them to send usage reports to the browser’s developers. A mainstream smartphone application has permissions to read our digital photo albums, contact lists and calendar, while at the same time it is free to use the phone’s internet connection in every way possible. This chapter discusses how the KeY System can be used to address the increasingly important question of information flow control: does a program introduce information flows between resources in a way which is in violation of our security policy?

Cite

CITATION STYLE

APA

Scheben, C., & Greiner, S. (2016). Information flow analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10001 LNCS, pp. 453–471). Springer Verlag. https://doi.org/10.1007/978-3-319-49812-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free