Static Analysis for Efficient Hybrid Information-Flow Control
暂无分享,去创建一个
[1] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[2] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[3] James Cheney,et al. Region-based memory management in cyclone , 2002, PLDI '02.
[4] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[5] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[6] Lars Ole Andersen,et al. Program Analysis and Specialization for the C Programming Language , 2005 .
[7] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[8] David Sands,et al. From Exponential to Polynomial-Time Security Typing via Principal Types , 2011, ESOP.
[9] Barbara G. Ryder,et al. Parameterized object sensitivity for points-to analysis for Java , 2005, TSEM.
[10] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[11] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[12] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[13] Alejandro Russo,et al. Securing Timeout Instructions in Web Applications , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[14] David Gay,et al. Memory management with explicit regions , 1998, PLDI.
[15] Andrei Sabelfeld. The Impact of Synchronisation on Secure Information Flow in Concurrent Programs , 2001, Ershov Memorial Conference.
[16] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[17] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[18] Bjarne Steensgaard,et al. Points-to analysis in almost linear time , 1996, POPL '96.
[19] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[20] Wei Xu,et al. Provably Correct Runtime Enforcement of Non-interference Properties , 2006, ICICS.
[21] Trevor Jim. What are principal typings and what are they good for? , 1996, POPL '96.
[22] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[23] Ondrej Lhoták,et al. Points-to analysis with efficient strong updates , 2011, POPL '11.
[24] Reinhard Wilhelm,et al. Parametric shape analysis via 3-valued logic , 1999, POPL '99.
[25] David A. Naumann,et al. Information Flow Monitor Inlining , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[26] Alejandro Russo,et al. On-the-fly inlining of dynamic security monitors , 2010, Comput. Secur..
[27] Andrew S. Tanenbaum,et al. A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..
[28] Vincent Simonet. The Flow Caml System: Documentation and user's manual , 2003 .
[29] Michael Franz,et al. Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[30] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[31] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[32] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[33] Alejandro Russo,et al. Tracking Information Flow in Dynamic Tree Structures , 2009, ESORICS.
[34] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[35] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.
[36] Mads Tofte,et al. Region-based Memory Management , 1997, Inf. Comput..
[37] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[38] Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).