From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research
暂无分享,去创建一个
[1] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[2] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[3] Adrian Hilton,et al. Enforcing security and safety models with an information flow analysis tool , 2004, SIGAda '04.
[4] Andrew C. Myers,et al. Jif: java information flow , 1999 .
[5] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[6] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[7] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[8] Alejandro Russo,et al. Securing Timeout Instructions in Web Applications , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[9] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[10] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[11] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[12] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[13] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[14] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[15] Vincent Simonet. The Flow Caml system , 2003 .
[16] Sophia Antipolis,et al. Secure Information Flow as a Safety Property , 2009 .
[17] Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[18] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[19] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[20] U. Norell,et al. Towards a practical programming language based on dependent type theory , 2007 .
[21] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[22] Anindya Banerjee,et al. Expressive Declassification Policies and Modular Static Enforcement , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[23] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[24] Gérard Boudol,et al. Secure Information Flow as a Safety Property , 2009, Formal Aspects in Security and Trust.
[25] Wei Xu,et al. Provably Correct Runtime Enforcement of Non-interference Properties , 2006, ICICS.
[26] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[27] Dennis M. Volpano. Safety versus Secrecy , 1999, SAS.
[28] John G. P. Barnes,et al. High Integrity Software - The SPARK Approach to Safety and Security , 2003 .
[29] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.