-
2
-
-
33745806932
-
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A Logic for Information Flow in Object-Oriented Programs. In Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006), pages 91-102, Charleston, SC, USA, Jan. 2006. Extended version as KSU CIS-TR-2005-1.
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A Logic for Information Flow in Object-Oriented Programs. In Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006), pages 91-102, Charleston, SC, USA, Jan. 2006. Extended version as KSU CIS-TR-2005-1.
-
-
-
-
3
-
-
33845946966
-
-
Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May
-
L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May 1994.
-
(1994)
Program
-
-
Andersen, L.O.1
-
4
-
-
0036086884
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
Oakland, CA, USA, May, IEEE Computer Society
-
K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 143-159, Oakland, CA, USA, May 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 143-159
-
-
Ashcraft, K.1
Engler, D.2
-
5
-
-
24144435318
-
History-based Access Control and Secure Information Flow
-
G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop CASSIS 2004, Revised Selected Papers, of
-
A. Banerjee and D. A. Naumann. History-based Access Control and Secure Information Flow. In G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of Lecture Notes in Computer Science, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3362
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
17044429386
-
Stack-based Access Control for Secure Information Flow
-
Mar, Special Issue on Language Based Security
-
A. Banerjee and D. A. Naumann. Stack-based Access Control for Secure Information Flow. Journal of Functional Programming, 15(2):131-177, Mar. 2005. Special Issue on Language Based Security.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
7
-
-
33751034907
-
Deriving an Information Flow Checker and Certifying Compiler for Java
-
Oakland, CA, USA, May
-
G. Barthe, D. A. Naumann, and T. Rezk. Deriving an Information Flow Checker and Certifying Compiler for Java. In 27th IEEE Symposium on Security and Privacy, pages 230-242, Oakland, CA, USA, May 2006.
-
(2006)
27th IEEE Symposium on Security and Privacy
, pp. 230-242
-
-
Barthe, G.1
Naumann, D.A.2
Rezk, T.3
-
8
-
-
29144532201
-
Non-interference for a JVM-like Language
-
M. Fähndrich, editor, Long Beach, CA, USA, Jan, ACM Press
-
G. Barthe and T. Rezk. Non-interference for a JVM-like Language. In M. Fähndrich, editor, Proceedings of 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementatio (TLDI 2005), pages 103-112, Long Beach, CA, USA, Jan. 2005. ACM Press.
-
(2005)
Proceedings of 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementatio (TLDI 2005)
, pp. 103-112
-
-
Barthe, G.1
Rezk, T.2
-
9
-
-
18944377182
-
-
M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, 54, Amsterdam, The Netherlands, 2001. Elsevier.
-
M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, volume 54, Amsterdam, The Netherlands, 2001. Elsevier.
-
-
-
-
10
-
-
4944219611
-
From Stack Inspection to Access Control: A Security Analysis for Libraries
-
Pacific Grove, CA, USA, June, IEEE Computer Society
-
F. Besson, T. Blanc, C. Fournet, and A. D. Gordon. From Stack Inspection to Access Control: A Security Analysis for Libraries. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW-17 2004), pages 61-75, Pacific Grove, CA, USA, June 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW-17 2004)
, pp. 61-75
-
-
Besson, F.1
Blanc, T.2
Fournet, C.3
Gordon, A.D.4
-
11
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Spring
-
M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 9(2):131-152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
12
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
July
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, 20(7):504-513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
14
-
-
34548753197
-
-
Eclipse Project
-
Eclipse Project, http://www.eclipse.org.
-
-
-
-
15
-
-
34548741086
-
-
Equinox Java Security Project
-
Equinox Java Security Project, http://www.eclipse.org/equinox/incubator/ security/java2security.html.
-
-
-
-
16
-
-
0016382977
-
Memoryless Subsystems
-
J. S. Fenton. Memoryless Subsystems. The Computer Journal, 17(2):143-147, 1974.
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
17
-
-
0036036247
-
Flow-Sensitive Type Qualifiers
-
Berlin, Germany, June
-
J. S. Foster, T. Terauchi, and A. Aiken. Flow-Sensitive Type Qualifiers. In Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2002), pages 1-12, Berlin, Germany, June 2002.
-
(2002)
Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2002)
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
18
-
-
0036041144
-
Stack Inspection: Theory and Variants
-
Portland, OR, USA, Jan, ACM Press
-
C. Fournet and A. D. Gordon. Stack Inspection: Theory and Variants. In Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2002), pages 307-318, Portland, OR, USA, Jan. 2002. ACM Press.
-
(2002)
Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2002)
, pp. 307-318
-
-
Fournet, C.1
Gordon, A.D.2
-
19
-
-
0020299523
-
Security Policies and Security Models
-
Oakland, CA, USA, May, IEEE Computer Society Press
-
J. A. Goguen and J. Meseguer. Security Policies and Security Models. In Proceedings of the 1982 IEEE Symposium on Security and Privacy, pages 11-20, Oakland, CA, USA, May 1982. IEEE Computer Society Press.
-
(1982)
Proceedings of the 1982 IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
20
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
-
Monterey, CA, USA, Dec
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, Monterey, CA, USA, Dec. 1997.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
21
-
-
0011792814
-
A Framework for Call Graph Construction Algorithms
-
November
-
D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.6
, pp. 685-746
-
-
Grove, D.1
Chambers, C.2
-
22
-
-
35048851425
-
Automata-based Confidentiality Monitoring
-
Tokio, Japan, Dec
-
G. L. Guernic, A. Banerjee, T. Jensen, and D. A. Schmidt. Automata-based Confidentiality Monitoring. In Proceedings of 11th Annual Asian Computing Science Conference (ASIAN 2006), Tokio, Japan, Dec. 2006.
-
(2006)
Proceedings of 11th Annual Asian Computing Science Conference (ASIAN 2006)
-
-
Guernic, G.L.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.A.4
-
23
-
-
34250357872
-
Information Flow Control for Java Based on Path Conditions in Dependence Graphs
-
Arlington, VA, USA, Mar
-
C. Hammer, J. Krinke, and G. Snelting. Information Flow Control for Java Based on Path Conditions in Dependence Graphs. In Proceedings of IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA, Mar. 2006.
-
(2006)
Proceedings of IEEE International Symposium on Secure Software Engineering
-
-
Hammer, C.1
Krinke, J.2
Snelting, G.3
-
25
-
-
0032667088
-
Verification of Control Flow Based Security Properties
-
Oakland, CA, USA, May
-
T. P. Jensen, D. L. Métayer, and T. Thorn. Verification of Control Flow Based Security Properties. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 89-103, Oakland, CA, USA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 89-103
-
-
Jensen, T.P.1
Métayer, D.L.2
Thorn, T.3
-
26
-
-
0015742560
-
A Unified Approach to Global Program Optimization
-
Boston, MA, USA, ACM Press
-
G. A. Kildall. A Unified Approach to Global Program Optimization. In Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages 194-206, Boston, MA, USA, 1973. ACM Press.
-
(1973)
Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages
, pp. 194-206
-
-
Kildall, G.A.1
-
27
-
-
0038108908
-
Access Rights Analysis for Java
-
Seattle, WA, USA, November, ACM Press
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access Rights Analysis for Java. In Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 359-372, Seattle, WA, USA, November 2002. ACM Press.
-
(2002)
Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
28
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
Baltimore, MD, USA, July
-
V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
29
-
-
0032646625
-
JFlow: Practical Mostly-static Information Flow Control
-
San Antonio, TX, USA, Jan
-
A. C. Myers. JFlow: Practical Mostly-static Information Flow Control. In Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1999), pages 228-241, San Antonio, TX, USA, Jan. 1999.
-
(1999)
Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1999)
, pp. 228-241
-
-
Myers, A.C.1
-
30
-
-
26844529721
-
Verifying a Secure Information Flow Analyzer
-
J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLs 2005, of, Oxford, UK, Aug, Springer
-
D. A. Naumann. Verifying a Secure Information Flow Analyzer. In J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLs 2005, volume 3603 of Lecture Notes in Computer Science, pages 211-226, Oxford, UK, Aug. 2005. Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3603
, pp. 211-226
-
-
Naumann, D.A.1
-
31
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
San Diego, CA, USA, Feb, IEEE Computer Society
-
J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS 2005), San Diego, CA, USA, Feb. 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium (NDSS 2005)
-
-
Newsome, J.1
Song, D.X.2
-
32
-
-
21644473233
-
NET Security: Lessons Learned and Missed from Java
-
Washington, DC, USA, December, IEEE Computer Society
-
N. Paul and D. Evans. .NET Security: Lessons Learned and Missed from Java. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 272-281, Washington, DC, USA, December 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004)
, pp. 272-281
-
-
Paul, N.1
Evans, D.2
-
33
-
-
26444502057
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
Glasgow, Scotland, UK, July, Springer-Verlag
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In Proceedings of the 19th European Conference on Object-Oriented Programming, pages 362-386, Glasgow, Scotland, UK, July 2005. Springer-Verlag.
-
(2005)
Proceedings of the 19th European Conference on Object-Oriented Programming
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
35
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
36
-
-
85084164620
-
Detecting Format String Vulnerabilities with Type Qualifiers
-
Washington, DC, USA, Aug
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting Format String Vulnerabilities with Type Qualifiers. In Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA, Aug. 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
37
-
-
33750912954
-
Efficent Path Conditions in Dependence Graphs for Software Safety Analysis
-
October
-
G. Snelting, T. Robschink, and J. Krinke. Efficent Path Conditions in Dependence Graphs for Software Safety Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM), 15(4):410-457, October 2006.
-
(2006)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.15
, Issue.4
, pp. 410-457
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
38
-
-
0019658399
-
Access Flows: A Protection Model which Integrates Access Control and Information Flow
-
Oakland, CA, USA, May
-
A. Stoughton. Access Flows: A Protection Model which Integrates Access Control and Information Flow. In Proceedings of the 1981 IEEE Symposium on Security and Privacy, pages 9-18, Oakland, CA, USA, May 1981.
-
(1981)
Proceedings of the 1981 IEEE Symposium on Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
-
39
-
-
34548778471
-
-
IBM Security Workbench Development Environment for Java SWORD4J
-
IBM Security Workbench Development Environment for Java (SWORD4J), http://www.alphaworks.ibm.com/tech/sword4j.
-
-
-
-
40
-
-
0033724116
-
IRM Enforcement of Java Stack Inspection
-
Oakland, CA, USA, May, IEEE Computer Society
-
Úlfar Erlingsson and F. B. Schneider. IRM Enforcement of Java Stack Inspection. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 246-255, Oakland, CA, USA, May 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
41
-
-
0030370740
-
A Sound Type System for Secure Flow Analysis
-
Jan
-
D. Volpano, C. Irvine, and G. Smith. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(2-3):167-187, Jan. 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
42
-
-
0004207406
-
-
O'Reilly & Associates, Inc, Sebastopol, CA, USA, third edition, July
-
L. Wall, T. Christiansen, and J. Orwant. Programming Perl. O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July 2000.
-
(2000)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Orwant, J.3
-
43
-
-
0039334688
-
SAFKASI: A Security Mechanism for Language-based Systems
-
D. S. Wallach, A. W. Appel, and E. W. Felten. SAFKASI: A Security Mechanism for Language-based Systems. ACM Transactions on Software Engineering and Methodology (TOSEM), 9(4):341-378, 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
44
-
-
0031677290
-
Understanding Java Stack Inspection
-
Oakland, CA, USA, May
-
D. S. Wallach and E. W. Felten. Understanding Java Stack Inspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 52-63, Oakland, CA, USA, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Wallach, D.S.1
Felten, E.W.2
-
45
-
-
28144446521
-
Type Annotations to Improve Stack-Based Access Control
-
Aix-en-Provence, France, June, IEEE Computer Society
-
T. Zhao and J. T. Boyland. Type Annotations to Improve Stack-Based Access Control. In 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), pages 197-210, Aix-en-Provence, France, June 2005. IEEE Computer Society.
-
(2005)
18th IEEE Computer Security Foundations Workshop (CSFW-18 2005)
, pp. 197-210
-
-
Zhao, T.1
Boyland, J.T.2
|