Multiple facets for dynamic information flow
暂无分享,去创建一个
[1] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[2] Collin Jackson,et al. Regular expressions considered harmful in client-side XSS filters , 2010, WWW '10.
[3] Adam A. Porter,et al. Using symbolic evaluation to understand behavior in configurable software systems , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[4] Alejandro Russo,et al. Tracking Information Flow in Dynamic Tree Structures , 2009, ESORICS.
[5] Sorin Lerner,et al. An empirical study of privacy-violating information flows in JavaScript web applications , 2010, CCS '10.
[6] Andrei Sabelfeld,et al. Limiting information leakage in event-based communication , 2011, PLAS '11.
[7] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[8] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[9] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[10] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[11] Alejandro Russo,et al. Securing Timeout Instructions in Web Applications , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[12] Andrew C. Myers,et al. A Semantic Framework for Declassification and Endorsement , 2010, ESOP.
[13] A. Prasad Sistla,et al. Preventing Information Leaks through Shadow Executions , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[14] Andrew C. Myers,et al. Programming Languages for Information Security , 2002 .
[15] Arnar Birgisson,et al. Capabilities for information flow , 2011, PLAS '11.
[16] Andrew C. Myers,et al. Security policies for downgrading , 2004, CCS '04.
[17] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[18] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[19] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[20] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[21] Steve Zdancewic,et al. A Type System for Robust Declassification , 2003, MFPS.
[22] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[23] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[24] Benjamin C. Pierce,et al. Reactive noninterference , 2009, CCS.
[25] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[26] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[27] Thomas H. Austin,et al. Permissive dynamic information flow analysis , 2010, PLAS '10.
[28] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[29] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[30] Ben Hardekopf,et al. Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach , 2011, 2011 IEEE Symposium on Security and Privacy.
[31] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[32] Stephen Chong,et al. Inference of Expressive Declassification Policies , 2011, 2011 IEEE Symposium on Security and Privacy.
[33] Benjamin Livshits,et al. Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Julien Lironcourt. Internet Security Seminar Analyzing Information Flow in JavaScript-based Browser Extensions , 2010 .
[35] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).