Note: This is a great overview with plenty of terms you can use to find modern work. It's branching out in all these areas. Key words to use include "non-interference", "static analysis," "covert channels," "labels," "confidentiality," and "side channels."
Note: Used in Civitas secure voting app. Links to Sif and Fabric are down the page a bit.
Note 2: You should be noticing by now that the Cornell teams (a) are pretty awesome and (b) were way ahead of most on this stuff.
Deterministically Deterring Timing Attacks in Deterland (2016)
Note: Thanks to a few events, there are piles of work on hardware ranging from invididual components to whole chips. So, I'm just grabbing examples of different types. This one is on VM's in cloud.
Øzone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures (2017)
Note: Throwing an attempt in that's trying to avoid secure processors. Only read abstract since I just found it. I'm always skeptical if commodity chips are involved, though. Best I've seen are hardware I.P. that reuse optimized processors sort of sitting between their cores and the decoders or RAM. Plus, multicore without shared caches or multiprocessing with each core/chip a security domain.
So, there's some different things for you. Kemmerer and Wray are definitive, older works. Sabelfield and Myers best overview of new stuff. After Meltdown/Spectre, the rest is coming so fast I'm not even tracking it. I'm glad someone asked justifying an attempt at a survey. Found some good links. :)
http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf
Note: This is a great overview with plenty of terms you can use to find modern work. It's branching out in all these areas. Key words to use include "non-interference", "static analysis," "covert channels," "labels," "confidentiality," and "side channels."
Securing Information Flow at Runtime (2008)
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142....
Note: Example of the language work they do to lay down foundations.
Static, Info-Flow Analysis That Handles Implicit Flows (2010)
http://www.cs.rpi.edu/~milanova/docs/csmr10.pdf
Note: This is a bit more like how you'd develop low-intervention, preventative analysis.
Static, Info-Flow Analysis on Hardware Language (2017)
https://www.cs.cornell.edu/andru/papers/trustzone/asplos17.p...
SecVerilog: Security-Typed HDL for Secure Hardware without Runtime Components (2017)
https://people.ece.cornell.edu/af433/pdf/ferraiuolo-dac-17.p...
Inline, Information-Flow Monitor for JIT-like Applications
https://www.cs.stevens.edu/~naumann/inlining/Chudnov_Informa...
Jif, Sif, and Fabric
https://www.cs.cornell.edu/jif/
Note: Used in Civitas secure voting app. Links to Sif and Fabric are down the page a bit. Note 2: You should be noticing by now that the Cornell teams (a) are pretty awesome and (b) were way ahead of most on this stuff.
Deterministically Deterring Timing Attacks in Deterland (2016)
https://pdfs.semanticscholar.org/6aa3/18e95cae5a932e330857e5...
Note: Thanks to a few events, there are piles of work on hardware ranging from invididual components to whole chips. So, I'm just grabbing examples of different types. This one is on VM's in cloud.
Øzone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures (2017)
https://arxiv.org/pdf/1703.07706.pdf
Note: Dedicated, execution unit.
SAFE processor
http://www.crash-safe.org/papers.html
Note: Its metadata engine can do secrecy labels. It can do a lot of policies actually. Commercially available for RISC processors as CoreGuard.
Software-based, Gate-level Information Flow Security for IoT Systems (2017)
http://rakeshk.crhc.illinois.edu/micro17_cam.pdf
Note: Throwing an attempt in that's trying to avoid secure processors. Only read abstract since I just found it. I'm always skeptical if commodity chips are involved, though. Best I've seen are hardware I.P. that reuse optimized processors sort of sitting between their cores and the decoders or RAM. Plus, multicore without shared caches or multiprocessing with each core/chip a security domain.
So, there's some different things for you. Kemmerer and Wray are definitive, older works. Sabelfield and Myers best overview of new stuff. After Meltdown/Spectre, the rest is coming so fast I'm not even tracking it. I'm glad someone asked justifying an attempt at a survey. Found some good links. :)