A verified information-flow architecture
暂无分享,去创建一个
Benjamin C. Pierce | Catalin Hritcu | David Pichardie | André DeHon | Delphine Demange | Arthur Azevedo de Amorim | Nathan Collins | Randy Pollack | Andrew Tolmach | B. Pierce | Catalin Hritcu | A. DeHon | A. Tolmach | R. Pollack | David Pichardie | Nathan Collins | Delphine Demange | Cătălin Hriţcu
[1] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[2] Marco Pistoia,et al. A language for information flow: dynamic tracking in multiple interdependent dimensions , 2009, PLAS '09.
[3] Benjamin C. Pierce,et al. Testing noninterference, quickly , 2013, Journal of Functional Programming.
[4] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[5] Gregor Snelting,et al. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs , 2009, International Journal of Information Security.
[6] Marco Pistoia,et al. Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[8] Deian Stefan,et al. Flexible dynamic information flow control in Haskell , 2012, Haskell '11.
[9] Howard Shrobe,et al. TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture , 2007 .
[10] Udit Dhawan,et al. Area-efficient near-associative memories on FPGAs , 2013, FPGA '13.
[11] Anindya Banerjee,et al. Stack-based access control and secure information flow , 2005, J. Funct. Program..
[12] Xavier Leroy,et al. A Formally Verified Compiler Back-end , 2009, Journal of Automated Reasoning.
[13] Dachuan Yu,et al. A Typed Assembly Language for Confidentiality , 2006, ESOP.
[14] Benjamin C. Pierce,et al. Micro-Policies: Formally Verified, Tag-Based Security Monitors , 2015, 2015 IEEE Symposium on Security and Privacy.
[15] G. Edward Suh,et al. High-performance parallel accelerator for flexible and efficient run-time monitoring , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[16] Guru Venkataramani,et al. FlexiTaint: A programmable accelerator for dynamic taint propagation , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.
[17] Eduardo Bonelli,et al. A Typed Assembly Language for Non-interference , 2005, ICTCS.
[18] Danfeng Zhang,et al. Predictive mitigation of timing channels in interactive systems , 2011, CCS '11.
[19] Scott Moore,et al. Static Analysis for Efficient Hybrid Information-Flow Control , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[20] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[21] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[22] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[23] Adam Chlipala,et al. Mostly-automated verification of low-level programs in computational separation logic , 2011, PLDI '11.
[24] Robert Grabowski,et al. Information flow analysis for mobile code in dynamic security environments , 2012 .
[25] Thomas H. Austin,et al. Permissive dynamic information flow analysis , 2010, PLAS '10.
[26] David Sands,et al. Dimensions and principles of declassification , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[27] G. Edward Suh,et al. Flexible and Efficient Instruction-Grained Run-Time Monitoring Using On-Chip Reconfigurable Fabric , 2010, 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture.
[28] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[29] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[30] Andrei Sabelfeld,et al. Information-Flow Security for a Core of JavaScript , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[31] Andrei Sabelfeld,et al. A Perspective on Information-Flow Control , 2012, Software Safety and Security.
[32] Nick Benton,et al. High-level separation logic for low-level code , 2013, POPL.
[33] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[34] Andrew C. Myers,et al. Mostly-static decentralized information flow control , 1999 .
[35] Yu Guo,et al. Deep Specifications and Certified Abstraction Layers , 2015, POPL.
[36] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[37] Thomas F. Knight,et al. Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA) , 2009 .
[38] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.
[39] Deian Stefan,et al. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling , 2013, ESORICS.
[40] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[41] Benjamin C. Pierce,et al. A Theory of Information-Flow Labels , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[42] Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[43] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[44] StefanDeian,et al. Flexible dynamic information flow control in Haskell , 2011 .
[45] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[46] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[47] David Leon,et al. Detecting and debugging insecure information flows , 2004, 15th International Symposium on Software Reliability Engineering.
[48] Artem Starostin,et al. A framework for static detection of privacy leaks in android applications , 2012, SAC '12.
[49] Benjamin C. Pierce,et al. A verified information-flow architecture , 2014, POPL.
[50] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[51] Timothy Bourke,et al. seL4: From General Purpose to a Proof of Information Flow Enforcement , 2013, 2013 IEEE Symposium on Security and Privacy.
[52] Deian Stefan,et al. Addressing covert termination and timing channels in concurrent information flow systems , 2012, ICFP '12.
[53] Roberto Guanciale,et al. Machine code verification of a tiny ARM hypervisor , 2013, TrustED '13.
[54] Joseph Tassarotti,et al. RockSalt: better, faster, stronger SFI for the x86 , 2012, PLDI.
[55] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[56] Eran Tromer,et al. Noninterference for a Practical DIFC-Based Operating System , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[57] Andrew C. Myers,et al. Programming Languages for Information Security , 2002 .
[58] Benjamin C. Pierce,et al. Testing noninterference, quickly , 2016, Journal of Functional Programming.
[59] Adam Chlipala,et al. The bedrock structured programming system: combining generative metaprogramming and hoare logic in an extensible program verifier , 2013, ICFP.
[60] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[61] Babak Falsafi,et al. Flexible Hardware Acceleration for Instruction-Grain Program Monitoring , 2008, 2008 International Symposium on Computer Architecture.
[62] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[63] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[64] Gilles Barthe,et al. A Certified Lightweight Non-interference Java Bytecode Verifier , 2007, ESOP.
[65] Deian Stefan,et al. A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems , 2013, TGC.
[66] Magnus O. Myreen,et al. Hoare Logic for Realistically Modelled Machine Code , 2007, TACAS.
[67] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[68] Deian Stefan,et al. Disjunction Category Labels , 2011, NordSec.
[69] Thomas F. Knight,et al. A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow , 2001 .
[70] Benjamin Grégoire,et al. The MOBIUS Proof Carrying Code Infrastructure , 2008, FMCO.
[71] Danfeng Zhang,et al. Predictive black-box mitigation of timing channels , 2010, CCS '10.
[72] Gernot Heiser,et al. The Last Mile: An Empirical Study of Timing Channels on seL4 , 2014, CCS.
[73] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[74] Jonathan M. Smith,et al. Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security , 2013, CCS.
[75] Jonathan M. Smith,et al. Preliminary design of the SAFE platform , 2011, PLOS '11.
[76] J. Jacob,et al. On the derivation of secure components , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[77] Gerwin Klein,et al. Noninterference for Operating System Kernels , 2012, CPP.
[78] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[79] Jonathan M. Smith,et al. Architectural Support for Software-Defined Metadata Processing , 2015, ASPLOS.
[80] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[81] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[82] Zhong Shao. Clean-Slate Development of Certified OS Kernels , 2015, CPP.
[83] Martín Abadi,et al. A Functional View of Imperative Information Flow , 2012, APLAS.
[84] Dachuan Yu. More Typed Assembly Languages for Confidentiality , 2007, APLAS.
[85] Suresh Jagannathan,et al. Relaxed-memory concurrency and verified compilation , 2011, POPL '11.
[86] Deepak Garg,et al. Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis , 2014, PLAS@ECOOP.
[87] Roberto Guanciale,et al. Automating Information Flow Analysis of Low Level Code , 2014, CCS.
[88] Thomas H. Austin,et al. Multiple facets for dynamic information flow , 2012, POPL '12.
[89] Jonathan M. Smith,et al. Hardware Support for Safety Interlocks and Introspection , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[90] Lennart Beringer. End-to-end Multilevel Hybrid Information Flow Control , 2012, APLAS.
[91] Benjamin C. Pierce,et al. All Your IFCException Are Belong to Us , 2013, 2013 IEEE Symposium on Security and Privacy.
[92] Xavier Leroy,et al. Formal Verification of a C-like Memory Model and Its Uses for Verifying Program Transformations , 2008, Journal of Automated Reasoning.
[93] Roberto Guanciale,et al. Formal verification of information flow security for a simple arm-based separation kernel , 2013, CCS.
[94] Mads Dam,et al. Machine Assisted Proof of ARMv7 Instruction Level Isolation Properties , 2013, CPP.
[95] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[96] Olatunji Ruwase,et al. Parallelizing dynamic information flow tracking , 2008, SPAA '08.
[97] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[98] Zhong Shao,et al. Certified assembly programming with embedded code pointers , 2006, POPL '06.