iLeak: A Lightweight System for Detecting Inadvertent Information Leaks
暂无分享,去创建一个
Angelos D. Keromytis | Georgios Portokalidis | Vasileios P. Kemerlis | Vasilis Pappas | A. Keromytis | G. Portokalidis | Vasilis Pappas | V. Kemerlis
[1] Bryan Cantrill,et al. Dynamic Instrumentation of Production Systems , 2004, USENIX Annual Technical Conference, General Track.
[2] Brad Chen,et al. Locating System Problems Using Dynamic Instrumentation , 2010 .
[3] M. Eric Johnson,et al. Inadvertent Disclosure - Information Leaks in the Extended Enterprise , 2007, WEIS.
[4] Alfred V. Aho,et al. The awk programming language , 1988 .
[5] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Towards Quantification of Network-Based Information Leaks via HTTP , 2008, HotSec.
[7] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[8] Andrew S. Tanenbaum,et al. A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..
[9] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[10] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[11] Michael Backes,et al. Automatic Discovery and Quantification of Information Leaks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[12] William W. Cohen,et al. CutOnce-Recipient Recommendation and Leak Detection in Action , 2008 .
[13] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[14] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[15] William W. Cohen,et al. Preventing Information Leaks in Email , 2007, SDM.
[16] M. Desnoyers,et al. Combined Tracing of the Kernel and Applications with LTTng , 2010 .