메뉴 건너뛰기




Volumn , Issue , 2007, Pages 149-163

Beyond stack inspection: A unified access-control and information-flow security model

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL; JAVA PROGRAMMING LANGUAGE; MATHEMATICAL MODELS; OBJECT ORIENTED PROGRAMMING; SENSITIVITY ANALYSIS;

EID: 34548708576     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.10     Document Type: Conference Paper
Times cited : (36)

References (45)
  • 2
    • 33745806932 scopus 로고    scopus 로고
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A Logic for Information Flow in Object-Oriented Programs. In Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006), pages 91-102, Charleston, SC, USA, Jan. 2006. Extended version as KSU CIS-TR-2005-1.
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A Logic for Information Flow in Object-Oriented Programs. In Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006), pages 91-102, Charleston, SC, USA, Jan. 2006. Extended version as KSU CIS-TR-2005-1.
  • 3
    • 33845946966 scopus 로고
    • Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May
    • L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May 1994.
    • (1994) Program
    • Andersen, L.O.1
  • 4
    • 0036086884 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • Oakland, CA, USA, May, IEEE Computer Society
    • K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 143-159, Oakland, CA, USA, May 2002. IEEE Computer Society.
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 143-159
    • Ashcraft, K.1    Engler, D.2
  • 5
    • 24144435318 scopus 로고    scopus 로고
    • History-based Access Control and Secure Information Flow
    • G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop CASSIS 2004, Revised Selected Papers, of
    • A. Banerjee and D. A. Naumann. History-based Access Control and Secure Information Flow. In G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3362
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based Access Control for Secure Information Flow
    • Mar, Special Issue on Language Based Security
    • A. Banerjee and D. A. Naumann. Stack-based Access Control for Secure Information Flow. Journal of Functional Programming, 15(2):131-177, Mar. 2005. Special Issue on Language Based Security.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 7
    • 33751034907 scopus 로고    scopus 로고
    • Deriving an Information Flow Checker and Certifying Compiler for Java
    • Oakland, CA, USA, May
    • G. Barthe, D. A. Naumann, and T. Rezk. Deriving an Information Flow Checker and Certifying Compiler for Java. In 27th IEEE Symposium on Security and Privacy, pages 230-242, Oakland, CA, USA, May 2006.
    • (2006) 27th IEEE Symposium on Security and Privacy , pp. 230-242
    • Barthe, G.1    Naumann, D.A.2    Rezk, T.3
  • 9
    • 18944377182 scopus 로고    scopus 로고
    • M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, 54, Amsterdam, The Netherlands, 2001. Elsevier.
    • M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, volume 54, Amsterdam, The Netherlands, 2001. Elsevier.
  • 11
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • Spring
    • M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 9(2):131-152, Spring 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 12
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 13
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • July
    • D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, 20(7):504-513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 34548753197 scopus 로고    scopus 로고
    • Eclipse Project
    • Eclipse Project, http://www.eclipse.org.
  • 15
    • 34548741086 scopus 로고    scopus 로고
    • Equinox Java Security Project
    • Equinox Java Security Project, http://www.eclipse.org/equinox/incubator/ security/java2security.html.
  • 16
    • 0016382977 scopus 로고
    • Memoryless Subsystems
    • J. S. Fenton. Memoryless Subsystems. The Computer Journal, 17(2):143-147, 1974.
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 21
    • 0011792814 scopus 로고    scopus 로고
    • A Framework for Call Graph Construction Algorithms
    • November
    • D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
    • (2001) ACM Trans. Program. Lang. Syst , vol.23 , Issue.6 , pp. 685-746
    • Grove, D.1    Chambers, C.2
  • 28
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • Baltimore, MD, USA, July
    • V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 2005.
    • (2005) Proceedings of the 14th USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 30
    • 26844529721 scopus 로고    scopus 로고
    • Verifying a Secure Information Flow Analyzer
    • J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLs 2005, of, Oxford, UK, Aug, Springer
    • D. A. Naumann. Verifying a Secure Information Flow Analyzer. In J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLs 2005, volume 3603 of Lecture Notes in Computer Science, pages 211-226, Oxford, UK, Aug. 2005. Springer.
    • (2005) Lecture Notes in Computer Science , vol.3603 , pp. 211-226
    • Naumann, D.A.1
  • 31
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • San Diego, CA, USA, Feb, IEEE Computer Society
    • J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS 2005), San Diego, CA, USA, Feb. 2005. IEEE Computer Society.
    • (2005) Proceedings of the 12th Network and Distributed System Security Symposium (NDSS 2005)
    • Newsome, J.1    Song, D.X.2
  • 35
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 38
    • 0019658399 scopus 로고
    • Access Flows: A Protection Model which Integrates Access Control and Information Flow
    • Oakland, CA, USA, May
    • A. Stoughton. Access Flows: A Protection Model which Integrates Access Control and Information Flow. In Proceedings of the 1981 IEEE Symposium on Security and Privacy, pages 9-18, Oakland, CA, USA, May 1981.
    • (1981) Proceedings of the 1981 IEEE Symposium on Security and Privacy , pp. 9-18
    • Stoughton, A.1
  • 39
    • 34548778471 scopus 로고    scopus 로고
    • IBM Security Workbench Development Environment for Java SWORD4J
    • IBM Security Workbench Development Environment for Java (SWORD4J), http://www.alphaworks.ibm.com/tech/sword4j.
  • 41
    • 0030370740 scopus 로고    scopus 로고
    • A Sound Type System for Secure Flow Analysis
    • Jan
    • D. Volpano, C. Irvine, and G. Smith. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(2-3):167-187, Jan. 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 42
    • 0004207406 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc, Sebastopol, CA, USA, third edition, July
    • L. Wall, T. Christiansen, and J. Orwant. Programming Perl. O'Reilly & Associates, Inc., Sebastopol, CA, USA, third edition, July 2000.
    • (2000) Programming Perl
    • Wall, L.1    Christiansen, T.2    Orwant, J.3
  • 45
    • 28144446521 scopus 로고    scopus 로고
    • Type Annotations to Improve Stack-Based Access Control
    • Aix-en-Provence, France, June, IEEE Computer Society
    • T. Zhao and J. T. Boyland. Type Annotations to Improve Stack-Based Access Control. In 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), pages 197-210, Aix-en-Provence, France, June 2005. IEEE Computer Society.
    • (2005) 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005) , pp. 197-210
    • Zhao, T.1    Boyland, J.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.