DBTaint: Cross-Application Information Flow Tracking via Databases
暂无分享,去创建一个
[1] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[2] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[3] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[4] Benjamin Livshits,et al. Securing web applications with static and dynamic information flow tracking , 2008, PEPM '08.
[5] Tzi-cker Chiueh,et al. Dynamic multi-process information flow tracking for web application security , 2007, MC '07.
[6] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[7] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[8] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.
[9] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[10] David A. Wagner,et al. Efficient character-level taint tracking for Java , 2009, SWS '09.
[11] Dawn Xiaodong Song,et al. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense , 2009, NDSS.
[12] Bill Broyles. Notes , 1907, The Classical Review.
[13] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[14] Hao Chen,et al. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks , 2009, NDSS.
[15] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[16] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.