메뉴 건너뛰기




Volumn 5352 LNCS, Issue , 2008, Pages 56-70

Implicit flows: Can't live with 'Em, can't live without 'Em

Author keywords

[No Author keywords available]

Indexed keywords

ALARM RATES; ANALYSIS TOOLS; SECURITY ANALYSIS; SECURITY PROPERTIES; SECURITY VIOLATIONS; SOFTWARE SYSTEMS;

EID: 58449135488     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89862-7_4     Document Type: Conference Paper
Times cited : (65)

References (25)
  • 1
    • 85084160254 scopus 로고    scopus 로고
    • Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
    • Black, J., Urtubia, H.: Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption. In: Proceedings of the 11th USENIX Security Symposium (2002)
    • (2002) Proceedings of the 11th USENIX Security Symposium
    • Black, J.1    Urtubia, H.2
  • 2
    • 84957693225 scopus 로고    scopus 로고
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, 1462, pp. 1-12. Springer, Heidelberg (1998)
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1-12. Springer, Heidelberg (1998)
  • 9
    • 84868888936 scopus 로고    scopus 로고
    • Fortify Software
    • Fortify Software. Fortify, http://www.fortify.com/
    • Fortify
  • 10
    • 0032690845 scopus 로고    scopus 로고
    • A theory of type qualifiers
    • Foster, J.S., Fähndrich, M., Aiken, A.: A theory of type qualifiers. In: PLDI, pp. 192-203 (1999)
    • (1999) PLDI , pp. 192-203
    • Foster, J.S.1    Fähndrich, M.2    Aiken, A.3
  • 12
    • 58449126184 scopus 로고    scopus 로고
    • Hicks, B., Ahmadizadeh, K., McDaniel, P.: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages, In: Jesshope, C, Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
    • Hicks, B., Ahmadizadeh, K., McDaniel, P.: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages, In: Jesshope, C, Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
  • 14
    • 58449111682 scopus 로고    scopus 로고
    • King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086. Springer, Heidelberg (2008)
    • King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086. Springer, Heidelberg (2008)
  • 16
    • 33745203758 scopus 로고    scopus 로고
    • Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: OOPLSA, pp. 365-383. ACM, New York (2005)
    • Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: OOPLSA, pp. 365-383. ACM, New York (2005)
  • 17
    • 57349180506 scopus 로고    scopus 로고
    • McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity, In: PLDI, pp. 193-205 (2008)
    • McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity, In: PLDI, pp. 193-205 (2008)
  • 18
    • 0032646625 scopus 로고    scopus 로고
    • Myers, A.C.: JFlow: Practical mostly-static information flow control, In: POPL, pp. 228-241 (January 1999)
    • Myers, A.C.: JFlow: Practical mostly-static information flow control, In: POPL, pp. 228-241 (January 1999)
  • 19
    • 0036037318 scopus 로고    scopus 로고
    • Pottier, F., Simonet, V.: Information flow inference for ML. In: POPL, pp. 319-330. ACM, New York (2002)
    • Pottier, F., Simonet, V.: Information flow inference for ML. In: POPL, pp. 319-330. ACM, New York (2002)
  • 22
    • 0002823436 scopus 로고
    • Two approaches to interprocedural dataflow analysis
    • Prentice-Hall, Englewood Cliffs
    • Sharir, M., Pnueli, A.: Two approaches to interprocedural dataflow analysis. In: Program Flow Analysis: Theory and Applications, pp. 189-234. Prentice-Hall, Englewood Cliffs (1981)
    • (1981) Program Flow Analysis: Theory and Applications , pp. 189-234
    • Sharir, M.1    Pnueli, A.2
  • 23
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS
    • Knudsen, L.R, ed, EURO CRYPT 2002, Springer, Heidelberg
    • Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EURO CRYPT 2002. LNCS, vol. 2332, pp. 534-546. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 534-546
    • Vaudenay, S.1
  • 24
    • 34249879570 scopus 로고    scopus 로고
    • Saturn: A scalable framework for error detection using boolean satisfiability
    • Xie, Y., Aiken, A.: Saturn: A scalable framework for error detection using boolean satisfiability. ACM Transactions on Programming Languages and Systems 29(3) (2007)
    • (2007) ACM Transactions on Programming Languages and Systems , vol.29 , Issue.3
    • Xie, Y.1    Aiken, A.2
  • 25
    • 85084161756 scopus 로고    scopus 로고
    • Using CQUAL for static analysis of authorization hook placement
    • USEN1X Association, Berkeley
    • Zhang, X., Edwards, A., Jaeger, T.: Using CQUAL for static analysis of authorization hook placement. In: Proceedings of the 11th USEN1X Security Symposium, pp. 33-48. USEN1X Association, Berkeley (2002)
    • (2002) Proceedings of the 11th USEN1X Security Symposium , pp. 33-48
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.