All Your IFCException Are Belong to Us
暂无分享,去创建一个
Benjamin C. Pierce | J. Gregory Morrisett | Catalin Hritcu | Michael Greenberg | Ben Karel | B. Pierce | G. Morrisett | Catalin Hritcu | M. Greenberg | Ben Karel | Greg Morrisett | Cătălin Hriţcu
[1] Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[2] Wei Xu,et al. Provably Correct Runtime Enforcement of Non-interference Properties , 2006, ICICS.
[3] Simon L. Peyton Jones,et al. A semantics for imprecise exceptions , 1999, PLDI '99.
[4] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[5] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Eran Tromer,et al. Noninterference for a Practical DIFC-Based Operating System , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Deian Stefan,et al. Flexible dynamic information flow control in Haskell , 2012, Haskell '11.
[8] Lujo Bauer,et al. Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract) , 2013, ESORICS.
[9] Koen Claessen,et al. QuickCheck: a lightweight tool for random testing of Haskell programs , 2000, ICFP.
[10] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[11] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[12] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[13] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[14] John H. Reppy,et al. Concurrent programming in ML , 1999 .
[15] Geoffrey Smith,et al. Lenient array operations for practical secure information flow , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[16] Thomas H. Austin,et al. Permissive dynamic information flow analysis , 2010, PLAS '10.
[17] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[18] Amr Sabry,et al. The essence of compiling with continuations , 1993, PLDI '93.
[19] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[20] Eddie Kohler,et al. Manageable fine-grained information flow , 2008, Eurosys '08.
[21] Timothy Bourke,et al. seL4: From General Purpose to a Proof of Information Flow Enforcement , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Jonathan M. Smith,et al. Preliminary design of the SAFE platform , 2011, PLOS '11.
[23] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[24] Frederic T. Chong,et al. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[25] Stephen Chong,et al. A more precise security type system for dynamic security tests , 2010, PLAS '10.
[26] Richard J. Beach,et al. A structural view of the Cedar programming environment , 1986, TOPL.
[27] Donald E. Porter,et al. Laminar: practical fine-grained decentralized information flow control , 2009, PLDI '09.
[28] Andrew C. Myers,et al. A Semantic Framework for Declassification and Endorsement , 2010, ESOP.
[29] Guy L. Steele. Debunking the “expensive procedure call” myth or, procedure call implementations considered harmful or, LAMBDA: The Ultimate GOTO , 1977, ACM '77.
[30] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[31] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[32] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[33] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[34] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[35] Lujo Bauer,et al. Run-Time Enforcement of Information-Flow Properties on Android (CMU-CyLab-12-015) , 2012 .
[36] Marco Pistoia,et al. A language for information flow: dynamic tracking in multiple interdependent dimensions , 2009, PLAS '09.
[37] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[38] Arnar Birgisson,et al. Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing , 2012, ESORICS.
[39] Matthias Felleisen,et al. Contracts for higher-order functions , 2002, ICFP '02.
[40] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[41] Guido D. Salvucci,et al. Ieee standard for binary floating-point arithmetic , 1985 .
[42] StefanDeian,et al. Flexible dynamic information flow control in Haskell , 2011 .
[43] Marco Pistoia,et al. Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[44] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[45] Andrei Sabelfeld,et al. Information-Flow Security for a Core of JavaScript , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[46] Benjamin C. Pierce,et al. Testing noninterference, quickly , 2013, Journal of Functional Programming.
[47] Ansi Ieee,et al. IEEE Standard for Binary Floating Point Arithmetic , 1985 .
[48] Scott Moore,et al. Static Analysis for Efficient Hybrid Information-Flow Control , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[49] Andrew C. Myers,et al. Secure Information Flow via Linear Continuations , 2002, High. Order Symb. Comput..
[50] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[51] Andrei Sabelfeld,et al. Catch me if you can: permissive yet secure error handling , 2009, PLAS '09.
[52] Andrew C. Myers,et al. Dynamic security labels and static information flow control , 2007, International Journal of Information Security.
[53] Martín Abadi,et al. A Functional View of Imperative Information Flow , 2012, APLAS.
[54] Winnie Cheng,et al. Abstractions for Usable Information Flow Control in Aeolus , 2012, USENIX Annual Technical Conference.
[55] Thomas H. Austin,et al. Multiple facets for dynamic information flow , 2012, POPL '12.
[56] Jonathan M. Smith,et al. Hardware Support for Safety Interlocks and Introspection , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops.