Explicit Secrecy: A Policy for Taint Tracking
暂无分享,去创建一个
Benjamin C. Pierce | Musard Balliu | Andrei Sabelfeld | Daniel Schoepe | B. Pierce | A. Sabelfeld | Musard Balliu | Daniel Schoepe
[1] Bei Yu,et al. TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[2] Arnar Birgisson,et al. JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.
[3] Jeffrey D. Ullman,et al. Global Data Flow Analysis and Iterative Algorithms , 1976, J. ACM.
[4] Patrick Cousot,et al. Andromeda: Accurate and Scalable Security Analysis of Web Applications , 2013, FASE.
[5] David Sands,et al. Declassification: Dimensions and principles , 2009, J. Comput. Secur..
[6] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[8] Arnar Birgisson,et al. Unifying Facets of Information Integrity , 2010, ICISS.
[9] Mads Dam,et al. TreeDroid: a tree automaton based approach to enforcing data processing policies , 2012, CCS '12.
[10] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[11] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[12] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[13] Gilles Barthe,et al. System-level Non-interference for Constant-time Cryptography , 2014, IACR Cryptol. ePrint Arch..
[14] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[15] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[16] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[17] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[18] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[19] Martín Abadi,et al. A core calculus of dependency , 1999, POPL '99.
[20] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[21] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[22] Thomas Jensen,et al. Pretty-big-step-semantics-based Certified Abstract Interpretation , 2014, JFLA.
[23] Stephen Chong,et al. Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[24] Haichen Shen,et al. Enhancing mobile apps to use sensor hubs without programmer effort , 2015, UbiComp.
[25] Thomas W. Reps,et al. Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.
[26] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[27] Jonathan M. Smith,et al. PUMP: a programmable unit for metadata processing , 2014, HASP@ISCA.
[28] Benjamin Livshits,et al. Dynamic Taint Tracking in Managed Runtimes , 2012 .
[29] Ana R. Cavalli,et al. Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses , 2012, CSS.
[30] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[31] Alejandro Russo,et al. A Taint Mode for Python via a Library , 2010, NordSec.
[32] Keqin Li,et al. Implicit flows in malicious and nonmalicious code , 2010, Logics and Languages for Reliability and Security.
[33] Christopher Krügel,et al. Static analysis for detecting taint-style vulnerabilities in web applications , 2010, J. Comput. Secur..
[34] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[35] Dennis M. Volpano. Safety versus Secrecy , 1999, SAS.
[36] Cristina Cifuentes,et al. User-Input Dependence Analysis via Graph Reachability , 2008, 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation.
[37] David Clark,et al. Non-Interference for Deterministic Interactive Programs , 2009, Formal Aspects in Security and Trust.
[38] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[39] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[40] Benjamin Livshits,et al. Towards fully automatic placement of security sanitizers and declassifiers , 2013, POPL 2013.
[41] Roberto Guanciale,et al. Automating Information Flow Analysis of Low Level Code , 2014, CCS.
[42] Lennart Beringer. End-to-end Multilevel Hybrid Information Flow Control , 2012, APLAS.
[43] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[44] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[45] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[46] Calvin Lin,et al. Efficient and extensible security enforcement using dynamic data flow analysis , 2008, CCS.
[47] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[48] Andrew C. Myers,et al. A Semantic Framework for Declassification and Endorsement , 2010, ESOP.
[49] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[50] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.
[51] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[52] Shay Artzi,et al. F4F: taint analysis of framework-based web applications , 2011, OOPSLA '11.
[53] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[54] David Sands,et al. Very Static Enforcement of Dynamic Policies , 2015, POST.
[55] Avik Chaudhuri,et al. A type system for data-flow integrity on Windows Vista , 2008, SIGP.