Security

Interactive Runtime Monitoring of Information Flow Policies

Free registration required

Executive Summary

Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific properties. Recently, the verification of security properties during run-time received increased attention from researchers. In particular, security properties that relate to information that is made available by the end users of the software is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as credit card data, government intelligence or personal medical information being processed by software, the more important it is to ensure the confidentiality of this information.

  • Format: PDF
  • Size: 143.45 KB