Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Agostino Cortesi,et al. Information leakage analysis of database query languages , 2014, SAC.
[3] Agostino Cortesi,et al. Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications , 2015, VMCAI.
[4] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[5] Agostino Cortesi,et al. Information-Flow Analysis of Hibernate Query Language , 2014, FDSE.
[6] Francesco Logozzo. Class invariants as abstract interpretation of trace semantics , 2009, Comput. Lang. Syst. Struct..
[7] Xiangyu Zhang,et al. Strict control dependence and its effect on dynamic information flow analyses , 2010, ISSTA '10.
[8] Jens Krinke,et al. Information Flow Control and Taint Analysis with Dependence Graphs , 2007 .
[9] Bernd Finkbeiner,et al. Model Checking Information Flow in Reactive Systems , 2012, VMCAI.
[10] Torben Amtoft,et al. A logic for information flow analysis with an application to forward slicing of simple imperative programs , 2007, Sci. Comput. Program..
[11] Geoffrey Smith,et al. Principles of Secure Information Flow Analysis , 2007, Malware Detection.
[12] Gregor Snelting,et al. Information Flow Control for Java Based on Path Conditions in Dependence Graphs , 2006, ISSSE.
[13] Salvador Cavadini,et al. Secure slices of insecure programs , 2008, ASIACCS '08.
[14] Agostino Cortesi,et al. SAILS: static analysis of information leakage with sample , 2012, SAC '12.
[15] Gregor Snelting,et al. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs , 2009, International Journal of Information Security.
[16] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[17] Agostino Cortesi,et al. Abstract interpretation of database query languages , 2012, Comput. Lang. Syst. Struct..
[18] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[19] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[20] Christian Hammer. Experiences with PDG-Based IFC , 2010, ESSoS.
[21] Gregory R. Andrews,et al. An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.
[22] Christian Bauer,et al. Java Persistence with Hibernate , 2006 .
[23] Raju Haider. Language-based security analysis of database applications , 2015 .
[24] Bixin Li,et al. Analyzing information-flow in java program based on slicing technique , 2002, SOEN.
[25] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[26] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[28] Heiko Mantel,et al. Types vs. PDGs in Information Flow Analysis , 2012, LOPSTR.
[29] David Sands,et al. Declassification: Dimensions and principles , 2009, J. Comput. Secur..
[30] Christian Bauer,et al. Hibernate in action , 2005 .
[31] Letizia Tanca,et al. Operational and abstract semantics of the query language G-Log , 2002, Theor. Comput. Sci..
[32] Patrick Cousot,et al. Systematic design of program analysis frameworks , 1979, POPL.
[33] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[34] Agostino Cortesi,et al. Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis , 2015, CISIM.
[35] Agostino Cortesi,et al. Information Leakage Analysis by Abstract Interpretation , 2011, SOFSEM.