z-logo
open-access-imgOpen Access
Tracing secure information flow through mode changes
Author(s) -
Colin J. Fidge,
Tim McComb
Publication year - 2006
Language(s) - English
Resource type - Book series
ISBN - 1-920682-30-9
DOI - 10.1145/1151699.1151733
Communications devices intended for use in security- critical applications must be rigorously evaluated to ensure they preserve data confidentiality. This pro- cess includes tracing the flow of classified informa- tion through the device's circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device's distinct operating modes. However, such analyses overlook potential in- formation flow between modes, via components that store information in one mode and release it in an- other. Here we show how graph-based analyses can be extended to allow for information flow through se- quences of consecutive modes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom