-
1
-
-
0033686981
-
A semantic model of types and machine instuctions for proof-carrying code
-
ACM Press
-
A.W. Appel and A.P. Felty. A semantic model of types and machine instuctions for proof-carrying code. In Proceedings of POPL '00, pages 243-253. ACM Press, 2000.
-
(2000)
Proceedings of POPL '00
, pp. 243-253
-
-
Appel, A.W.1
Felty, A.P.2
-
2
-
-
26844460326
-
Mechanized Metatheory for the Masses: The PoplMark Challenge
-
Proceedings of TPHOLs'05, of, Springer-Verlag
-
B.E. Aydemir, A. Bohannon, M. Fairbairn, J.N. Foster, B.C. Pierce, P. Sewell, D. Vytiniotis, G. Washburn, S. Weirich, and S. Zdancewic. Mechanized Metatheory for the Masses: The PoplMark Challenge. In Proceedings of TPHOLs'05, volume 3603 of Lecture Notes in Computer Science, pages 50-65. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3603
, pp. 50-65
-
-
Aydemir, B.E.1
Bohannon, A.2
Fairbairn, M.3
Foster, J.N.4
Pierce, B.C.5
Sewell, P.6
Vytiniotis, D.7
Washburn, G.8
Weirich, S.9
Zdancewic, S.10
-
3
-
-
17044429386
-
Stack-based access control for secure information flow
-
March
-
A. Banerjee and D. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15:131-177, March 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.2
-
5
-
-
85069029287
-
Non-interference for low level languages
-
Technical report, INRIA
-
G. Barthe, D. Pichardie, and T. Rezk. Non-interference for low level languages. Technical report, INRIA, 2006. http://hal.inria.fr/inria-00106182.
-
(2006)
-
-
Barthe, G.1
Pichardie, D.2
Rezk, T.3
-
6
-
-
29144532201
-
Non-interference for a JVM-like language
-
M. Fähndrich, editor, ACM Press
-
G. Barthe and T. Rezk. Non-interference for a JVM-like language. In M. Fähndrich, editor, Proceedings of TLDI'05, pages 103-112. ACM Press, 2005.
-
(2005)
Proceedings of TLDI'05
, pp. 103-112
-
-
Barthe, G.1
Rezk, T.2
-
7
-
-
33749615715
-
Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression
-
F. Besson, T. Jensen, and D Pichardie. Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression. Theoretical Computer Science, 364(3) :273-291, 2006.
-
(2006)
Theoretical Computer Science
, vol.364
, Issue.3
, pp. 273-291
-
-
Besson, F.1
Jensen, T.2
Pichardie, D.3
-
8
-
-
0036425267
-
Checking Secure Interactions of Smart Card Applets: Extended version
-
P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard, and J.-L. Lanet. Checking Secure Interactions of Smart Card Applets: Extended version. Journal of Computer Security, 10:369-398, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 369-398
-
-
Bieber, P.1
Cazin, J.2
Wiels, V.3
Zanon, G.4
Girard, P.5
Lanet, J.-L.6
-
9
-
-
33745821985
-
Information flow analysis for a typed assembly language with polymorphic stacks
-
Proceedings of CASSIS'05, of, Springer-Verlag
-
E. Bonelli, A.B. Compagnoni, and R. Medel. Information flow analysis for a typed assembly language with polymorphic stacks. In Proceedings of CASSIS'05, volume 3956 of Lecture Notes in Computer Science, pages 37-56. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3956
, pp. 37-56
-
-
Bonelli, E.1
Compagnoni, A.B.2
Medel, R.3
-
10
-
-
24144440405
-
Information Flow Analysis for Java Bytecode
-
Proceedings of VMCAI'05, of, Springer-Verlag
-
S. Genaim and F. Spoto. Information Flow Analysis for Java Bytecode. In Proceedings of VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 346-362. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 346-362
-
-
Genaim, S.1
Spoto, F.2
-
11
-
-
1442287656
-
Abstract non-interference: Parameterizing noninterference by abstract interpretation
-
ACM Press
-
R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing noninterference by abstract interpretation. In Proceedings of POPL'04, pages 186-197. ACM Press, 2004.
-
(2004)
Proceedings of POPL'04
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
12
-
-
33947687258
-
Noninterference in the presence of non-opaque pointers
-
IEEE Computer Society Press
-
D. Hedin and D. Sands. Noninterference in the presence of non-opaque pointers. In Proceedings of CSFW'06, pages 255-269. IEEE Computer Society Press, 2006.
-
(2006)
Proceedings of CSFW'06
, pp. 255-269
-
-
Hedin, D.1
Sands, D.2
-
13
-
-
33745218338
-
On Flow-Sensitive Security Types
-
ACM Press
-
S. Hunt and D. Sands. On Flow-Sensitive Security Types. In Proceedings of POPL'06, pages 79-90. ACM Press, 2006.
-
(2006)
Proceedings of POPL'06
, pp. 79-90
-
-
Hunt, S.1
Sands, D.2
-
14
-
-
0037051773
-
Bytecode verification on Java smart cards
-
April
-
X. Leroy. Bytecode verification on Java smart cards. Software-practice and experience, 32(4):319-340, April 2002.
-
(2002)
Software-practice and experience
, vol.32
, Issue.4
, pp. 319-340
-
-
Leroy, X.1
-
15
-
-
0032646625
-
Jflow: Practical mostly-static information flow control
-
ACM Press
-
A.C. Myers. Jflow: Practical mostly-static information flow control. In Proceedings of POPL'99, pages 228-241. ACM Press, 1999.
-
(1999)
Proceedings of POPL'99
, pp. 228-241
-
-
Myers, A.C.1
-
16
-
-
26844529721
-
Verifying a secure information flow analyzer
-
Proceedings of TPHOLs'05, of, Springer-Verlag
-
D. Naumann. Verifying a secure information flow analyzer. In Proceedings of TPHOLs'05, volume 3603 of Lecture Notes in Computer Science, pages 211-226. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3603
, pp. 211-226
-
-
Naumann, D.1
-
18
-
-
33947645959
-
Securing interaction between threads and the scheduler
-
A. Russo and A. Sabelfeld. Securing interaction between threads and the scheduler. In Proceedings of CSFW'06, 2006.
-
(2006)
Proceedings of CSFW'06
-
-
Russo, A.1
Sabelfeld, A.2
-
20
-
-
28144453799
-
Dimensions and principles of declassification
-
IEEE Press
-
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In Proceedings of CSFW'05. IEEE Press, 2005.
-
(2005)
Proceedings of CSFW'05
-
-
Sabelfeld, A.1
Sands, D.2
-
21
-
-
84956989228
-
A Type-Based Approach to Program Security
-
M. Bidoit and M. Dauchet, editors, Proceedings of TAPSOFT'97, of, Springer-Verlag
-
D. Volpano and G. Smith. A Type-Based Approach to Program Security. In M. Bidoit and M. Dauchet, editors, Proceedings of TAPSOFT'97, volume 1214 of Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
22
-
-
33745771350
-
A typed assembly language for confidentiality
-
P. Sestoft, editor, Proceedings of ESOP'06, of, Springer-Verlag
-
D. Yu and N. Islam. A typed assembly language for confidentiality. In P. Sestoft, editor, Proceedings of ESOP'06, volume 3924 of Lecture Notes in Computer Science, pages 162-179. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3924
, pp. 162-179
-
-
Yu, D.1
Islam, N.2
|