How Powerful Are Run-Time Monitors with Static Information?

[1]  Kevin W. Hamlen,et al.  Computability classes for enforcement mechanisms , 2006, TOPL.

[2]  Lujo Bauer,et al.  Run-Time Enforcement of Nonsafety Policies , 2009, TSEC.

[3]  Nadia Tawbi,et al.  Extending the enforcement power of truncation monitors using static analysis , 2011, Comput. Secur..

[4]  Lujo Bauer,et al.  Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.

[5]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[6]  Philip W. L. Fong Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[7]  Jay Ligatti,et al.  A Theory of Runtime Enforcement, with Results , 2010, ESORICS.

[8]  Nadia Tawbi,et al.  Which security policies are enforceable by runtime monitors? A survey , 2012, Comput. Sci. Rev..

[9]  Stephen Chong,et al.  Hybrid Monitors for Concurrent Noninterference , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[10]  Fabio Massacci,et al.  Iterative enforcement by suppression: Towards practical enforcement theories , 2012, J. Comput. Secur..

[11]  David A. Naumann,et al.  Information Flow Monitoring as Abstract Interpretation for Relational Logic , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.

[12]  Nadia Tawbi,et al.  Corrective Enforcement of Security Policies , 2010, Formal Aspects in Security and Trust.

[13]  Ruggero Lanotte,et al.  Security Policies Enforcement Using Finite Edit Automata , 2009, Electron. Notes Theor. Comput. Sci..

[14]  Nadia Tawbi,et al.  Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors , 2012, TSEC.

[15]  Nadia Tawbi,et al.  Execution monitoring enforcement under memory-limitation constraints , 2008, Inf. Comput..

[16]  Dilsun Kirli Kaynar,et al.  Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors , 2012, STM.

[17]  Arnar Birgisson,et al.  JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.

[18]  Fred B. Schneider,et al.  Enforceable security policies , 2000, TSEC.

[19]  Jay Ligatti,et al.  Modeling runtime enforcement with mandatory results automata , 2014, International Journal of Information Security.

[20]  Felix Klaedtke,et al.  Enforceable Security Policies Revisited , 2012, TSEC.

[21]  Fabio Massacci,et al.  Do you really mean what you actually enforced? , 2011, International Journal of Information Security.

[22]  Alejandro Russo,et al.  On-the-fly inlining of dynamic security monitors , 2012, Comput. Secur..

[23]  Fabio Massacci,et al.  Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.

[24]  Dominique Devriese,et al.  Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.

[25]  Dominique Devriese,et al.  FlowFox: a web browser with flexible and precise information flow control , 2012, CCS '12.

[26]  Nadia Tawbi,et al.  Using Equivalence Relations for Corrective Enforcement of Security Policies , 2010, MMM-ACNS.

[27]  Alejandro Russo,et al.  From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.

[28]  Lujo Bauer,et al.  Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract) , 2013, ESORICS.

[29]  Fabio Massacci,et al.  Predictability of Enforcement , 2011, ESSoS.

[30]  Alejandro Russo,et al.  Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[31]  Andrew C. Myers,et al.  Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[32]  Frank Piessens,et al.  Runtime Enforcement of Security Policies on Black Box Reactive Programs , 2015, POPL.

[33]  Mahesh Viswanathan,et al.  Computational Analysis of Run-time Monitoring - Fundamentals of Java-MaC , 2002, Electron. Notes Theor. Comput. Sci..

[34]  Ruggero Lanotte,et al.  Security policies enforcement using finite and pushdown edit automata , 2013, International Journal of Information Security.

[35]  Lujo Bauer,et al.  Enforcing Non-safety Security Policies with Program Monitors , 2005, ESORICS.