A more precise security type system for dynamic security tests
暂无分享,去创建一个
[1] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[2] Frank Pfenning,et al. Functional programming with names and necessity , 2004 .
[3] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[4] Adam Chlipala,et al. Effective interactive proofs for higher-order imperative programs , 2009, ICFP.
[5] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[6] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[7] Glynn Winskel,et al. The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.
[8] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[9] Andrew C. Myers,et al. Decentralized robustness , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[10] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[11] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[12] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[13] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[14] Xin Zheng,et al. Secure web applications via automatic partitioning , 2007, SOSP.
[15] Andrew C. Myers,et al. Dynamic Security Labels and Noninterference , 2004 .
[16] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[17] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[18] David Endler,et al. The Evolution of Cross Site Scripting Attacks , 2002 .
[19] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[20] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[21] Xin Qi,et al. Fabric: a platform for secure distributed computation and storage , 2009, SOSP '09.
[22] Andrew C. Myers,et al. SIF: Enforcing Confidentiality and Integrity in Web Applications , 2007, USENIX Security Symposium.
[23] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[24] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[25] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[26] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[27] Lennart Beringer,et al. Noninterference with Dynamic Security Domains and Policies , 2009, ASIAN.
[28] Boniface Hicks,et al. From Languages to Systems: Understanding Practical Application Development in Security-typed Languages , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[29] Benjamin C. Pierce,et al. Types and programming languages: the next generation , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..