-
1
-
-
84948972811
-
The cartesian product algorithm: Simple and precise type inference of parametric polymorphism
-
Springer-Verlag, August
-
Ole Agesen. The Cartesian Product Algorithm: Simple and Precise Type Inference Of Parametric Polymorphism. In Proceedings of the 9th European Conference on Object-Oriented Programming, pages 2-26. Springer-Verlag, August 1995.
-
(1995)
Proceedings of the 9th European Conference on Object-oriented Programming
, pp. 2-26
-
-
Agesen, O.1
-
2
-
-
0004072686
-
-
Addison-Wesley, Reading, MA, USA, January
-
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, USA, January 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
3
-
-
0036086884
-
Using programmer-written compiler extensions to catch security holes
-
Oakland, CA, USA, May. IEEE Computer Society
-
Ken Ashcraft and Dawson Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 143-159, Oakland, CA, USA, May 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 143-159
-
-
Ashcraft, K.1
Engler, D.2
-
4
-
-
0004312442
-
A simple semantics and static analysis for Java security
-
Stevens Institute of Technology, Hoboken, NJ, USA, July
-
Anindya Banerjee and David A. Naumann. A Simple Semantics and Static Analysis for Java Security. Technical Report CS2001-1, Stevens Institute of Technology, Hoboken, NJ, USA, July 2001.
-
(2001)
Technical Report
, vol.CS2001-1
-
-
Banerjee, A.1
Naumann, D.A.2
-
5
-
-
18944377182
-
Static analysis for stack inspection
-
Amsterdam, The Netherlands 2001. Elsevier
-
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, volume 54, Amsterdam, The Netherlands, 2001. Elsevier.
-
Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science
, vol.54
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
6
-
-
18944374558
-
Stack inspection and secure program transformations
-
August
-
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. Stack Inspection and Secure Program Transformations. International Journal of Information Security, 2(3):187-217, August 2004.
-
(2004)
International Journal of Information Security
, vol.2
, Issue.3
, pp. 187-217
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
7
-
-
4944219611
-
From stack inspection to access control: A security analysis for libraries
-
Pacific Grove, CA, USA, June. IEEE Computer Society
-
Frédéric Besson, Tomasz Blanc, Cédric Fournet, and Andrew D. Gordon. From Stack Inspection to Access Control: A Security Analysis for Libraries. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, pages 61-75, Pacific Grove, CA, USA, June 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop
, pp. 61-75
-
-
Besson, F.1
Blanc, T.2
Fournet, C.3
Gordon, A.D.4
-
9
-
-
0029697575
-
Java security: From HotJava to Netscape and beyond
-
Silver Spring, MD, USA. IEEE Computer Society Press
-
Drew Dean, Edward W. Felten, and Dan S. Wallach. Java Security: From HotJava to Netscape and beyond. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 190-200, Silver Spring, MD, USA, 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
-
10
-
-
0037974167
-
Java security: Web browsers and beyond
-
Princeton University, Princeton, NJ, USA, February
-
Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz. Java Security: Web Browsers and Beyond. Technical Report 566-597, Princeton University, Princeton, NJ, USA, February 1997.
-
(1997)
Technical Report
, vol.566
, Issue.597
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
Balfanz, D.4
-
11
-
-
84948958710
-
Optimization of object-oriented programs using static class hierarchy analysis
-
Aarhus, Denmark, August. Springer-Verlag
-
Jeffrey Dean, David Grove, and Craig Chambers. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In Proceedings of the 9th European Conference on Object-Oriented Programming, pages 77-101, Aarhus, Denmark, August 1995. Springer-Verlag.
-
(1995)
Proceedings of the 9th European Conference on Object-oriented Programming
, pp. 77-101
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
12
-
-
0003396723
-
-
PhD thesis, Princeton University, Princeton, NJ, USA, January
-
Richard Drews Dean. Formal Aspects of Mobile Code Security. PhD thesis, Princeton University, Princeton, NJ, USA, January 1999.
-
(1999)
Formal Aspects of Mobile Code Security
-
-
Dean, R.D.1
-
13
-
-
26444617897
-
-
Eclipse Project, http://www.eclipse.org.
-
-
-
-
14
-
-
0033724116
-
IRM enforcement of Java stack inspection
-
Oakland, CA, USA, May. IEEE Computer Society
-
Ulfar Erlingsson and Fred B. Schneider. IRM Enforcement of Java Stack Inspection. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 246-255, Oakland, CA, USA, May 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
15
-
-
0036036247
-
Flow-sensitive type qualifiers
-
Berlin, Germany, June
-
Jeffrey S. Foster, Tachio Terauchi, and Alex Aiken. Flow-Sensitive Type Qualifiers. In Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 1-12, Berlin, Germany, June 2002.
-
(2002)
Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
16
-
-
21644484975
-
-
O'Reilly & Associates, Inc., Sebastopol, CA, USA, June
-
Adam Freeman and Allen Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
-
(2003)
Programming .NET Security
-
-
Freeman, A.1
Jones, A.2
-
17
-
-
0003801299
-
-
Addison-Wesley, Reading, MA, USA, second edition, May
-
Li Gong, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA, USA, second edition, May 2003.
-
(2003)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
Ellison, G.2
Dageforde, M.3
-
18
-
-
0004277741
-
-
Birkhäuser, Boston, MA, USA, second edition, January
-
George Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
-
(2003)
General Lattice Theory
-
-
Grätzer, G.1
-
19
-
-
26444497249
-
Path-sensitive analysis for linear arithmetic and uninterpreted functions
-
11th Static Analysis Symposium. Springer-Verlag, August
-
Sumit Gulwani and George C. Necula. Path-sensitive Analysis for Linear Arithmetic and Uninterpreted Functions. In 11th Static Analysis Symposium, volume 3148 of LNCS, pages 328-343. Springer-Verlag, August 2004.
-
(2004)
LNCS
, vol.3148
, pp. 328-343
-
-
Gulwani, S.1
Necula, G.C.2
-
20
-
-
0032667088
-
Verification of control flow based security properties
-
Oakland, CA, USA, May
-
Thomas P. Jensen, Daniel Le Métayer, and Tommy Thorn. Verification of Control Flow Based Security Properties. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 89-103, Oakland, CA, USA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 89-103
-
-
Jensen, T.P.1
Le Métayer, D.2
Thorn, T.3
-
21
-
-
26444442801
-
-
Paul A. Karger, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA. Private communication, 17 December 2004
-
Paul A. Karger, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA. Private communication, 17 December 2004.
-
-
-
-
23
-
-
0022278941
-
A security analysis of VAX VMS
-
ACM Press
-
John F. Koegel, Rhonda M. Koegel, Zhiming Li, and Dattaram T. Miruke. A Security Analysis of VAX VMS. In ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective, pages 381-386. ACM Press, 1985.
-
(1985)
ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective
, pp. 381-386
-
-
Koegel, J.F.1
Koegel, R.M.2
Li, Z.3
Miruke, D.T.4
-
24
-
-
0038108908
-
Access rights analysis for Java
-
Seattle, WA, USA, November. ACM Press
-
Larry Koved, Marco Pistoia, and Aaron Kershenbaum. Access Rights Analysis for Java. In Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 359-372, Seattle, WA, USA, November 2002. ACM Press.
-
(2002)
Proceedings of the 17th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
26
-
-
26444597311
-
Static analysis of role-based access control in J2EE applications
-
September
-
Gleb Naumovich and Paolina Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. SIGSOFT Software Engineering Notes, 29(5):1-10, September 2004.
-
(2004)
SIGSOFT Software Engineering Notes
, vol.29
, Issue.5
, pp. 1-10
-
-
Naumovich, G.1
Centonze, P.2
-
27
-
-
26444444438
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA, USA, February. IEEE Computer Society
-
James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
28
-
-
26444562678
-
-
Addison-Wesley, Reading, MA, USA, February
-
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security. Addison-Wesley, Reading, MA, USA, February 2004.
-
(2004)
Enterprise Java Security
-
-
Pistoia, M.1
Nagaratnam, N.2
Koved, L.3
Nadalin, A.4
-
29
-
-
0004286931
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August
-
Marco Pistoia, Duane Relier, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August 1999.
-
(1999)
Java 2 Network Security
-
-
Pistoia, M.1
Relier, D.2
Gupta, D.3
Nagnur, M.4
Ramani, A.K.5
-
31
-
-
35248819232
-
Dimensions of precision in reference analysis of object-oriented languages
-
Warsaw, Poland, April. Invited Paper
-
Barbara G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In Proceedings of the 12th International Conference on Compiler Construction, pages 126-137, Warsaw, Poland, April 2003. Invited Paper.
-
(2003)
Proceedings of the 12th International Conference on Compiler Construction
, pp. 126-137
-
-
Ryder, B.G.1
-
32
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
33
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, DC, USA, August
-
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner. Detecting Format String Vulnerabilities with Type Qualifiers. In Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA, August 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
37
-
-
0030370740
-
A sound type system for secure flow analysis
-
January
-
Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(2-3):167-187, January 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
38
-
-
0004207406
-
-
O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July
-
Larry Wall, Tom Christiansen, and Jon Orwant. Programming Perl. O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July 2000.
-
(2000)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Orwant, J.3
-
39
-
-
0003396725
-
-
PhD thesis, Princeton University, Princeton, NJ, USA, January
-
Dan S. Wallach. A New Approach to Mobile-Code Security. PhD thesis, Princeton University, Princeton, NJ, USA, January 1999.
-
(1999)
A New Approach to Mobile-code Security
-
-
Wallach, D.S.1
-
40
-
-
0031542975
-
Extensible security architectures for Java
-
Saint Malo, France. ACM Press
-
Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten. Extensible Security Architectures for Java. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 116-128, Saint Malo, France, 1997. ACM Press.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
41
-
-
0031677290
-
Understanding Java stack inspection
-
Oakland, CA, USA, May
-
Dan S. Wallach and Edward W. Felten. Understanding Java Stack Inspection. In Proceedings of the IEEE Symposium on Security and Privacy, pages 52-63, Oakland, CA, USA, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Wallach, D.S.1
Felten, E.W.2
|