Secure Multi-Execution through Static Program Transformation
暂无分享,去创建一个
[1] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[2] Ankur Taly,et al. Isolating JavaScript with Filters, Rewriting, and Wrappers , 2009, ESORICS.
[3] David A. Naumann,et al. Information Flow Monitor Inlining , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[4] Ankur Taly,et al. Object Capabilities and Isolation of Untrusted Web Applications , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Thomas H. Austin,et al. Permissive dynamic information flow analysis , 2010, PLAS '10.
[6] Gurvan Le Guernic. Information Flow Testing , 2007, ASIAN.
[7] Úlfar Erlingsson,et al. Automated Analysis of Security-Critical JavaScript APIs , 2011, 2011 IEEE Symposium on Security and Privacy.
[8] Dominique Devriese,et al. Reactive non-interference for a browser model , 2011, 2011 5th International Conference on Network and System Security.
[9] Maximiliano Cristiá,et al. Runtime Enforcement of Noninterference by Duplicating Processes and their Memories , 2009 .
[10] Dominique Devriese,et al. Secure Multi-Execution through Static Program Transformation , 2012, FMOODS/FORTE.
[11] Gurvan Le Guernic. Confidentiality Enforcement Using Dynamic Information Flow Analyses , 2007 .
[12] Jan Vitek,et al. The Eval That Men Do - A Large-Scale Study of the Use of Eval in JavaScript Applications , 2011, ECOOP.
[13] Alejandro Russo,et al. Tracking Information Flow in Dynamic Tree Structures , 2009, ESORICS.
[14] Peng Ning,et al. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.
[15] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[16] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[17] Alejandro Russo,et al. Securing Timeout Instructions in Web Applications , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[18] Alejandro Russo,et al. Secure Multi-execution in Haskell , 2011, Ershov Memorial Conference.
[19] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[20] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[21] Ben Hardekopf,et al. Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach , 2011, 2011 IEEE Symposium on Security and Privacy.
[22] Andrew D. Gordon,et al. Maintaining Database Integrity with Refinement Types , 2011, ECOOP.
[23] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[24] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[25] A. Prasad Sistla,et al. Preventing Information Leaks through Shadow Executions , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[26] V. N. Venkatakrishnan,et al. AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements , 2010, USENIX Security Symposium.
[27] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[28] Arnar Birgisson,et al. Capabilities for information flow , 2011, PLAS '11.
[29] Mark A. Hillebrand,et al. Invariants, Modularity, and Rights , 2009, Ershov Memorial Conference.
[30] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[31] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[32] Salvador Cavadini,et al. Secure slices of insecure programs , 2008, ASIACCS '08.
[33] Thomas H. Austin,et al. Multiple facets for dynamic information flow , 2012, POPL '12.