Rewriting-Based Runtime Verification for Alternation-Free HyperLTL
暂无分享,去创建一个
[1] David A. Naumann,et al. Information Flow Monitoring as Abstract Interpretation for Relational Logic , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[2] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[3] Bernd Finkbeiner,et al. Temporal Logics for Hyperproperties , 2013, POST.
[4] Andrew S. Tanenbaum,et al. A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..
[5] Borzoo Bonakdarpour,et al. Runtime Verification of k-Safety Hyperproperties in HyperLTL , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[6] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] David Clark,et al. Non-Interference for Deterministic Interactive Programs , 2009, Formal Aspects in Security and Trust.
[8] David A. Naumann,et al. Calculational Design of Information Flow Monitors , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[9] Zohar Manna,et al. Temporal verification of reactive systems - safety , 1995 .
[10] Grigore Rosu,et al. Rewriting-Based Techniques for Runtime Verification , 2005, Automated Software Engineering.
[11] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[12] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Grigore Rosu,et al. Monitoring programs using rewriting , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[14] Alejandro Russo,et al. On-the-fly inlining of dynamic security monitors , 2010, Comput. Secur..
[15] Daryl McCullough,et al. Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[16] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[17] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[18] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[19] Zohar Manna,et al. Temporal Verification of Reactive Systems , 1995, Springer New York.
[20] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[21] David A. Naumann,et al. Information Flow Monitor Inlining , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[22] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[23] Dawn Song,et al. Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks , 2009 .
[24] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[25] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[26] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[27] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.