Permissive dynamic information flow analysis
暂无分享,去创建一个
[1] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[2] Benjamin Livshits,et al. Merlin: specification inference for explicit information flow problems , 2009, PLDI '09.
[3] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[4] Alejandro Russo,et al. Securing Timeout Instructions in Web Applications , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[5] Wei Xu,et al. Provably Correct Runtime Enforcement of Non-interference Properties , 2006, ICICS.
[6] Erik Poll,et al. Explicit information flow properties in JML , 2008 .
[7] Avik Chaudhuri,et al. A type system for data-flow integrity on Windows Vista , 2008, SIGP.
[8] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[9] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[10] Alejandro Russo,et al. From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research , 2009, Ershov Memorial Conference.
[11] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[12] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[13] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[14] Gregor Snelting,et al. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs , 2009, International Journal of Information Security.
[15] Michael Franz,et al. Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[16] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[17] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[18] David A. Naumann,et al. Information Flow Monitor Inlining , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[19] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[20] Anindya Banerjee,et al. Secure information flow and pointer con .nement in a java-like language , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[21] Andrei Sabelfeld,et al. Catch me if you can: permissive yet secure error handling , 2009, PLAS '09.
[22] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[23] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[24] Jonas Magazinius,et al. A lattice-based approach to mashup security , 2010, ASIACCS '10.
[25] Cédric Fournet,et al. Cryptographically sound implementations for typed information-flow security , 2008, POPL '08.
[26] Andrew C. Myers,et al. Security policies for downgrading , 2004, CCS '04.
[27] Alejandro Russo,et al. Tracking Information Flow in Dynamic Tree Structures , 2009, ESORICS.
[28] Andrew C. Myers,et al. Programming Languages for Information Security , 2002 .
[29] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[30] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[31] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[32] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[33] Marco Pistoia,et al. A language for information flow: dynamic tracking in multiple interdependent dimensions , 2009, PLAS '09.
[34] Mason Chang,et al. Trace-based just-in-time type specialization for dynamic languages , 2009, PLDI '09.
[35] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[36] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..