Noninterference via Symbolic Execution
暂无分享,去创建一个
[1] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[2] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[3] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[4] David Sands,et al. Dimensions and principles of declassification , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[5] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[6] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[7] Roberto Gorrieri,et al. A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..
[8] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[9] Alexander Aiken,et al. Secure Information Flow as a Safety Problem , 2005, SAS.
[10] Andrew C. Myers,et al. Enforcing Robust Declassification and Qualified Robustness , 2006, J. Comput. Secur..
[11] Andrew C. Myers,et al. A Model for Delimited Information Release , 2003, ISSS.
[12] Roberto Giacobazzi,et al. Abstract non-interference: parameterizing non-interference by abstract interpretation , 2004, POPL.
[13] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[14] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[15] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[16] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[17] Anindya Banerjee,et al. Stack-based access control and secure information flow , 2005, J. Funct. Program..
[18] Michael Backes,et al. Automatic Discovery and Quantification of Information Leaks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] Geoffrey Smith,et al. A Type-Based Approach to Program Security , 1997, TAPSOFT.
[20] Reiner Hähnle,et al. A Theorem Proving Approach to Analysis of Secure Information Flow , 2005, SPC.
[21] Gilles Barthe,et al. Non-interference for a JVM-like language , 2005, TLDI '05.
[22] Anindya Banerjee,et al. Towards a logical account of declassification , 2007, PLAS '07.
[23] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.