-
1
-
-
33745219100
-
A logic for information flow analysis of pointer programs
-
Kansas State University, July
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow analysis of pointer programs. Technical Report CIS TR 2005-1, Kansas State University, July 2005.
-
(2005)
Technical Report
, vol.CIS TR 2005-1
-
-
Amtoft, T.1
Bandhakavi, S.2
Banerjee, A.3
-
2
-
-
35048839749
-
Information flow analysis in logical form
-
Springer-Verlag
-
T. Amtoft and A. Banerjee. Information flow analysis in logical form. In SAS, LNCS 3148, pages 100-115. Springer-Verlag, 2004.
-
(2004)
SAS, LNCS
, vol.3148
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
3
-
-
33745849987
-
A logic for information flow analysis with an application to forward slicing of simple imperative programs
-
special issue of SAS . To appear
-
T. Amtoft and A. Banerjee. A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Computer Programming, special issue of SAS 2004. To appear.
-
(2004)
Science of Computer Programming
-
-
Amtoft, T.1
Banerjee, A.2
-
5
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Springer-Verlag
-
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In ESORICS, LNCS 3679, pages 197-221. Springer-Verlag, 2005.
-
(2005)
ESORICS, LNCS
, vol.3679
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
6
-
-
17044429386
-
Stack-based access control and secure information flow
-
Mar.
-
A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. JFP 15(2):131-177, Mar. 2005.
-
(2005)
JFP
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
8
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
MITRE Corp.
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, MITRE Corp., 1973.
-
(1973)
Technical Report
, vol.MTR-2547
-
-
Bell, D.1
Lapadula, L.2
-
9
-
-
0038716510
-
Points-to analysis using BDDs
-
M. Berndl, O. Lhoták, F. Qian, L. J. Hendren, and N. Umanee. Points-to analysis using BDDs. In PLDI, pages 103-114, 2003.
-
(2003)
PLDI
, pp. 103-114
-
-
Berndl, M.1
Lhoták, O.2
Qian, F.3
Hendren, L.J.4
Umanee, N.5
-
12
-
-
18944384605
-
An overview of JML tools and applications
-
L. Burdy, Y. Cheon, D. R. Cok, M. D. Ernst, J. Kiniry, G. T. Leavens, K. R. M. Leino, and E. Poll. An overview of JML tools and applications. Electr. Notes Theor. Comput. Sci., 80, 2003.
-
(2003)
Electr. Notes Theor. Comput. Sci.
, vol.80
-
-
Burdy, L.1
Cheon, Y.2
Cok, D.R.3
Ernst, M.D.4
Kiniry, J.5
Leavens, G.T.6
Leino, K.R.M.7
Poll, E.8
-
13
-
-
33745213914
-
Analysis of pointers and structures (with retrospective)
-
D. R. Chase, M. N. Wegman, and F. K. Zadeck. Analysis of pointers and structures (with retrospective). In Best of PLDI, pages 343-359, 1990.
-
(1990)
Best of PLDI
, pp. 343-359
-
-
Chase, D.R.1
Wegman, M.N.2
Zadeck, F.K.3
-
14
-
-
0001760770
-
Information transmission in sequential programs
-
Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
D. Denning and P. Denning. Certification of programs for secure information flow. CACM 20(7):504-513, 1977.
-
(1977)
CACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
16
-
-
0036036098
-
Extended static checking for Java
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for Java. In PLDI, pages 234-245, 2002.
-
(2002)
PLDI
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
18
-
-
33745847182
-
On flow-sensitive security types
-
To appear
-
S. Hunt and D. Sands. On flow-sensitive security types. In POPL 2006. To appear.
-
(2006)
POPL
-
-
Hunt, S.1
Sands, D.2
-
19
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, pages 228-241, 1999.
-
(1999)
POPL
, pp. 228-241
-
-
Myers, A.C.1
-
21
-
-
84944269268
-
Local reasoning about programs that alter data structures
-
Springer-Verlag
-
P. O'Heam, J. Reynolds, and H. Yang. Local reasoning about programs that alter data structures. In CSL, LNCS 2142, pages 1-19. Springer-Verlag, 2001.
-
(2001)
CSL, LNCS
, vol.2142
, pp. 1-19
-
-
O'Heam, P.1
Reynolds, J.2
Yang, H.3
-
22
-
-
0348017041
-
Information flow inference for ML
-
Jan.
-
F. Pottier and V. Simonet. Information flow inference for ML. TOPLAS 25(1):117-158, Jan. 2003.
-
(2003)
TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
23
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
J. C. Reynolds. Separation logic: a logic for shared mutable data structures. In LICS, pages 55-74. 2002.
-
(2002)
LICS
, pp. 55-74
-
-
Reynolds, J.C.1
-
25
-
-
35048864843
-
Modular and constraint-based information flow inference for an object-oriented language
-
Springer-Verlag
-
Q. Sun, A. Banerjee, and D. A. Naumann. Modular and constraint-based information flow inference for an object-oriented language. In SAS, LNCS 3148, pages 84-99. Springer-Verlag, 2004.
-
(2004)
SAS, LNCS
, vol.3148
, pp. 84-99
-
-
Sun, Q.1
Banerjee, A.2
Naumann, D.A.3
-
26
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2/3): 167-188, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|