How Powerful Are Run-Time Monitors with Static Information?
暂无分享,去创建一个
[1] Kevin W. Hamlen,et al. Computability classes for enforcement mechanisms , 2006, TOPL.
[2] Lujo Bauer,et al. Run-Time Enforcement of Nonsafety Policies , 2009, TSEC.
[3] Nadia Tawbi,et al. Extending the enforcement power of truncation monitors using static analysis , 2011, Comput. Secur..
[4] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[5] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[6] Philip W. L. Fong. Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] Jay Ligatti,et al. A Theory of Runtime Enforcement, with Results , 2010, ESORICS.
[8] Nadia Tawbi,et al. Which security policies are enforceable by runtime monitors? A survey , 2012, Comput. Sci. Rev..
[9] Stephen Chong,et al. Hybrid Monitors for Concurrent Noninterference , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[10] Fabio Massacci,et al. Iterative enforcement by suppression: Towards practical enforcement theories , 2012, J. Comput. Secur..
[11] David A. Naumann,et al. Information Flow Monitoring as Abstract Interpretation for Relational Logic , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[12] Nadia Tawbi,et al. Corrective Enforcement of Security Policies , 2010, Formal Aspects in Security and Trust.
[13] Ruggero Lanotte,et al. Security Policies Enforcement Using Finite Edit Automata , 2009, Electron. Notes Theor. Comput. Sci..
[14] Nadia Tawbi,et al. Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors , 2012, TSEC.
[15] Nadia Tawbi,et al. Execution monitoring enforcement under memory-limitation constraints , 2008, Inf. Comput..
[16] Dilsun Kirli Kaynar,et al. Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors , 2012, STM.
[17] Arnar Birgisson,et al. JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.
[18] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[19] Jay Ligatti,et al. Modeling runtime enforcement with mandatory results automata , 2014, International Journal of Information Security.
[20] Felix Klaedtke,et al. Enforceable Security Policies Revisited , 2012, TSEC.
[21] Fabio Massacci,et al. Do you really mean what you actually enforced? , 2011, International Journal of Information Security.
[22] Alejandro Russo,et al. On-the-fly inlining of dynamic security monitors , 2012, Comput. Secur..
[23] Fabio Massacci,et al. Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[24] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[25] Dominique Devriese,et al. FlowFox: a web browser with flexible and precise information flow control , 2012, CCS '12.
[26] Nadia Tawbi,et al. Using Equivalence Relations for Corrective Enforcement of Security Policies , 2010, MMM-ACNS.
[27] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[28] Lujo Bauer,et al. Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract) , 2013, ESORICS.
[29] Fabio Massacci,et al. Predictability of Enforcement , 2011, ESSoS.
[30] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[31] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[32] Frank Piessens,et al. Runtime Enforcement of Security Policies on Black Box Reactive Programs , 2015, POPL.
[33] Mahesh Viswanathan,et al. Computational Analysis of Run-time Monitoring - Fundamentals of Java-MaC , 2002, Electron. Notes Theor. Comput. Sci..
[34] Ruggero Lanotte,et al. Security policies enforcement using finite and pushdown edit automata , 2013, International Journal of Information Security.
[35] Lujo Bauer,et al. Enforcing Non-safety Security Policies with Program Monitors , 2005, ESORICS.