메뉴 건너뛰기




Volumn 3586, Issue , 2005, Pages 362-386

Interprocedural analysis for privileged code placement and tainted variable detection

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); CONTROL SYSTEMS; DATABASE SYSTEMS; OBJECT ORIENTED PROGRAMMING;

EID: 26444502057     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11531142_16     Document Type: Conference Paper
Times cited : (39)

References (41)
  • 1
    • 84948972811 scopus 로고
    • The cartesian product algorithm: Simple and precise type inference of parametric polymorphism
    • Springer-Verlag, August
    • Ole Agesen. The Cartesian Product Algorithm: Simple and Precise Type Inference Of Parametric Polymorphism. In Proceedings of the 9th European Conference on Object-Oriented Programming, pages 2-26. Springer-Verlag, August 1995.
    • (1995) Proceedings of the 9th European Conference on Object-oriented Programming , pp. 2-26
    • Agesen, O.1
  • 3
    • 0036086884 scopus 로고    scopus 로고
    • Using programmer-written compiler extensions to catch security holes
    • Oakland, CA, USA, May. IEEE Computer Society
    • Ken Ashcraft and Dawson Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 143-159, Oakland, CA, USA, May 2002. IEEE Computer Society.
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 143-159
    • Ashcraft, K.1    Engler, D.2
  • 4
    • 0004312442 scopus 로고    scopus 로고
    • A simple semantics and static analysis for Java security
    • Stevens Institute of Technology, Hoboken, NJ, USA, July
    • Anindya Banerjee and David A. Naumann. A Simple Semantics and Static Analysis for Java Security. Technical Report CS2001-1, Stevens Institute of Technology, Hoboken, NJ, USA, July 2001.
    • (2001) Technical Report , vol.CS2001-1
    • Banerjee, A.1    Naumann, D.A.2
  • 7
    • 4944219611 scopus 로고    scopus 로고
    • From stack inspection to access control: A security analysis for libraries
    • Pacific Grove, CA, USA, June. IEEE Computer Society
    • Frédéric Besson, Tomasz Blanc, Cédric Fournet, and Andrew D. Gordon. From Stack Inspection to Access Control: A Security Analysis for Libraries. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, pages 61-75, Pacific Grove, CA, USA, June 2004. IEEE Computer Society.
    • (2004) Proceedings of the 17th IEEE Computer Security Foundations Workshop , pp. 61-75
    • Besson, F.1    Blanc, T.2    Fournet, C.3    Gordon, A.D.4
  • 10
    • 0037974167 scopus 로고    scopus 로고
    • Java security: Web browsers and beyond
    • Princeton University, Princeton, NJ, USA, February
    • Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz. Java Security: Web Browsers and Beyond. Technical Report 566-597, Princeton University, Princeton, NJ, USA, February 1997.
    • (1997) Technical Report , vol.566 , Issue.597
    • Dean, D.1    Felten, E.W.2    Wallach, D.S.3    Balfanz, D.4
  • 11
    • 84948958710 scopus 로고
    • Optimization of object-oriented programs using static class hierarchy analysis
    • Aarhus, Denmark, August. Springer-Verlag
    • Jeffrey Dean, David Grove, and Craig Chambers. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In Proceedings of the 9th European Conference on Object-Oriented Programming, pages 77-101, Aarhus, Denmark, August 1995. Springer-Verlag.
    • (1995) Proceedings of the 9th European Conference on Object-oriented Programming , pp. 77-101
    • Dean, J.1    Grove, D.2    Chambers, C.3
  • 12
    • 0003396723 scopus 로고    scopus 로고
    • PhD thesis, Princeton University, Princeton, NJ, USA, January
    • Richard Drews Dean. Formal Aspects of Mobile Code Security. PhD thesis, Princeton University, Princeton, NJ, USA, January 1999.
    • (1999) Formal Aspects of Mobile Code Security
    • Dean, R.D.1
  • 13
    • 26444617897 scopus 로고    scopus 로고
    • Eclipse Project, http://www.eclipse.org.
  • 16
    • 21644484975 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc., Sebastopol, CA, USA, June
    • Adam Freeman and Allen Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
    • (2003) Programming .NET Security
    • Freeman, A.1    Jones, A.2
  • 18
    • 0004277741 scopus 로고    scopus 로고
    • Birkhäuser, Boston, MA, USA, second edition, January
    • George Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
    • (2003) General Lattice Theory
    • Grätzer, G.1
  • 19
    • 26444497249 scopus 로고    scopus 로고
    • Path-sensitive analysis for linear arithmetic and uninterpreted functions
    • 11th Static Analysis Symposium. Springer-Verlag, August
    • Sumit Gulwani and George C. Necula. Path-sensitive Analysis for Linear Arithmetic and Uninterpreted Functions. In 11th Static Analysis Symposium, volume 3148 of LNCS, pages 328-343. Springer-Verlag, August 2004.
    • (2004) LNCS , vol.3148 , pp. 328-343
    • Gulwani, S.1    Necula, G.C.2
  • 21
    • 26444442801 scopus 로고    scopus 로고
    • Paul A. Karger, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA. Private communication, 17 December 2004
    • Paul A. Karger, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA. Private communication, 17 December 2004.
  • 26
    • 26444597311 scopus 로고    scopus 로고
    • Static analysis of role-based access control in J2EE applications
    • September
    • Gleb Naumovich and Paolina Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. SIGSOFT Software Engineering Notes, 29(5):1-10, September 2004.
    • (2004) SIGSOFT Software Engineering Notes , vol.29 , Issue.5 , pp. 1-10
    • Naumovich, G.1    Centonze, P.2
  • 27
    • 26444444438 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA, USA, February. IEEE Computer Society
    • James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2005. IEEE Computer Society.
    • (2005) Proceedings of the 12th Annual Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 31
    • 35248819232 scopus 로고    scopus 로고
    • Dimensions of precision in reference analysis of object-oriented languages
    • Warsaw, Poland, April. Invited Paper
    • Barbara G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In Proceedings of the 12th International Conference on Compiler Construction, pages 126-137, Warsaw, Poland, April 2003. Invited Paper.
    • (2003) Proceedings of the 12th International Conference on Compiler Construction , pp. 126-137
    • Ryder, B.G.1
  • 32
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 37
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • January
    • Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(2-3):167-187, January 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 38
    • 0004207406 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July
    • Larry Wall, Tom Christiansen, and Jon Orwant. Programming Perl. O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July 2000.
    • (2000) Programming Perl
    • Wall, L.1    Christiansen, T.2    Orwant, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.