Strict control dependence and its effect on dynamic information flow analyses
暂无分享,去创建一个
Xiangyu Zhang | Dongyan Xu | Zhiqiang Lin | Tao Bao | Yunhui Zheng | X. Zhang | Dongyan Xu | Zhiqiang Lin | Yunhui Zheng | Tao Bao
[1] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[2] Xiangyu Zhang,et al. Efficient online detection of dynamic control dependence , 2007, ISSTA '07.
[3] Keshav Pingali,et al. A framework for generalized control dependence , 1996, PLDI '96.
[4] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[5] Xiangyu Zhang,et al. Pruning dynamic slices with confidence , 2006, PLDI '06.
[6] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[7] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[8] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[9] David Leon,et al. Detecting and debugging insecure information flows , 2004, 15th International Symposium on Software Reliability Engineering.
[10] Mark David Weiser,et al. Program slices: formal, psychological, and practical investigations of an automatic program abstraction method , 1979 .
[11] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[12] Alessandro Orso,et al. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting , 2009, ISSTA.
[13] Xiangyu Zhang,et al. Towards locating execution omission errors , 2007, PLDI '07.
[14] Xiang Zhang,et al. Tracing Lineage Beyond Relational Operators , 2007, VLDB.
[15] Gregg Rothermel,et al. Interprocedural control dependence , 2001, TSEM.
[16] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[17] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[18] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[19] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[20] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[21] Lori A. Clarke,et al. A Formal Model of Program Dependences and Its Implications for Software Testing, Debugging, and Maintenance , 1990, IEEE Trans. Software Eng..
[22] FerranteJeanne,et al. The program dependence graph and its use in optimization , 1987 .
[23] David W. Binkley,et al. Interprocedural slicing using dependence graphs , 1990, TOPL.
[24] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[25] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[26] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[27] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[28] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[29] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1987, TOPL.