Tracing secure information flow through mode changes
Fidge, Colin J. & McComb, Tim (2006) Tracing secure information flow through mode changes. In Estivill-Castro, V. & Dobbie, G. (Eds.) 29th Australasian Computer Science Conference (ACSC 2006), 16-19 January 2006, Hobart.
Communications devices intended for use in security-critical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information through the device's circuitry. Previous work has shown how this can be done using graph analysis techniques for each of the device's distinct operating modes. However, such analyses overlook potential information flow between modes, via components that store information in one mode and release it in another. Here we show how graph-based analyses can be extended to allow for information flow through sequences of consecutive modes.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Keywords:||Information security, Information flow, Computer communications devices|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Schools > School of Information Systems
|Copyright Owner:||Copyright 2006 ACM Press|
|Copyright Statement:||Reproduced in accordance with the copyright policy of the publisher.|
|Deposited On:||23 Mar 2006|
|Last Modified:||29 Feb 2012 13:23|
Repository Staff Only: item control page