Provably Correct Runtime Enforcement of Non-interference Properties
暂无分享,去创建一个
Wei Xu | Daniel C. DuVarney | V. N. Venkatakrishnan | R. Sekar | W. Xu | R. Sekar | V. Venkatakrishnan
[1] Larry Wall,et al. Programming Perl - covers Perl 5, 2nd Edition , 1996, A nutshell handbook.
[2] Chris I. Dalton,et al. Dynamic label binding at run-time , 2003, NSPW '03.
[3] Ken Kennedy,et al. Interprocedural side-effect analysis in linear time , 1988, PLDI '88.
[4] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[5] Keith D. Cooper,et al. Interprocedural side-effect analysis in linear time (with retrospective) , 1988, PLDI 1988.
[6] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[7] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[8] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[9] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[10] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[11] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[12] Gregory R. Andrews,et al. An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.
[13] Peng Li,et al. Downgrading policies and relaxed noninterference , 2005, POPL '05.
[14] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[15] Monica S. Lam,et al. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams , 2004, PLDI '04.
[16] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[17] Andrew C. Myers,et al. Dynamic Security Labels and Noninterference (Extended Abstract) , 2004, Formal Aspects in Security and Trust.
[18] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[19] Manuvir Das,et al. Unification-based pointer analysis with directional assignments , 2000, PLDI '00.
[20] Daniel C. DuVarney,et al. A Program Transformation Technique for Enforcement of Information Flow Properties ∗ , 2004 .
[21] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[22] Dennis M. Volpano. Safety versus Secrecy , 1999, SAS.
[23] Andrew C. Myers,et al. Dynamic Security Labels and Noninterference , 2004 .
[24] Alexander Aiken,et al. Secure Information Flow as a Safety Problem , 2005, SAS.
[25] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[26] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[27] Gurvan Le Guernic,et al. Monitoring Information Flow , 2005 .
[28] Peter M. Broadwell,et al. Scrash: A System for Generating Secure Crash Information , 2003, USENIX Security Symposium.
[29] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[30] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[31] Andrew C. Myers,et al. Enforcing robust declassification , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[32] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[33] Anindya Banerjee,et al. Using access control for secure information flow in a Java-like language , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[34] John McLean,et al. Proving Noninterference and Functional Correctness Using Traces , 1992, J. Comput. Secur..
[35] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[36] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[37] Reiner Hähnle,et al. A Theorem Proving Approach to Analysis of Secure Information Flow , 2005, SPC.
[38] Gilles Barthe,et al. Deriving an information flow checker and certifying compiler for Java , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).