-
1
-
-
85084160254
-
Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
-
Black, J., Urtubia, H.: Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption. In: Proceedings of the 11th USENIX Security Symposium (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Black, J.1
Urtubia, H.2
-
2
-
-
84957693225
-
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, 1462, pp. 1-12. Springer, Heidelberg (1998)
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1-12. Springer, Heidelberg (1998)
-
-
-
-
4
-
-
33749586163
-
-
Springer, Heidelberg
-
Chalin, P., Kiniry, J.R., Leavens, G.T., Poll, E.: Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2., pp. 342-363, Springer, Heidelberg (2006)
-
(2006)
Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2
, pp. 342-363
-
-
Chalin, P.1
Kiniry, J.R.2
Leavens, G.T.3
Poll, E.4
-
5
-
-
85084162287
-
Setuid demystified
-
USEN1X Association, Berkeley
-
Chen, H., Wagner, D., Dean, D.: Setuid demystified, In: Proceedings of the 11th USEN1X Security Symposium, pp. 171-190. USEN1X Association, Berkeley (2002)
-
(2002)
Proceedings of the 11th USEN1X Security Symposium
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
7
-
-
50249102797
-
Civitas: Toward a secure voting system
-
Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354-368 (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 354-368
-
-
Clarkson, M.R.1
Chong, S.2
Myers, A.C.3
-
8
-
-
0036036098
-
Extended static checking for Java
-
June
-
Flanagan, C, Leino, K.R.M., Lillibridge, M., Nelson, G., Saxe, J.B., Stata, R.: Extended static checking for Java. In: PLDI, vol. 37, pp. 234-245 (June 2002)
-
(2002)
PLDI
, vol.37
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
9
-
-
84868888936
-
-
Fortify Software
-
Fortify Software. Fortify, http://www.fortify.com/
-
Fortify
-
-
-
10
-
-
0032690845
-
A theory of type qualifiers
-
Foster, J.S., Fähndrich, M., Aiken, A.: A theory of type qualifiers. In: PLDI, pp. 192-203 (1999)
-
(1999)
PLDI
, pp. 192-203
-
-
Foster, J.S.1
Fähndrich, M.2
Aiken, A.3
-
12
-
-
58449126184
-
-
Hicks, B., Ahmadizadeh, K., McDaniel, P.: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages, In: Jesshope, C, Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
-
Hicks, B., Ahmadizadeh, K., McDaniel, P.: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages, In: Jesshope, C, Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
58449111682
-
-
King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086. Springer, Heidelberg (2008)
-
King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086. Springer, Heidelberg (2008)
-
-
-
-
16
-
-
33745203758
-
-
Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: OOPLSA, pp. 365-383. ACM, New York (2005)
-
Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: OOPLSA, pp. 365-383. ACM, New York (2005)
-
-
-
-
17
-
-
57349180506
-
-
McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity, In: PLDI, pp. 193-205 (2008)
-
McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity, In: PLDI, pp. 193-205 (2008)
-
-
-
-
18
-
-
0032646625
-
-
Myers, A.C.: JFlow: Practical mostly-static information flow control, In: POPL, pp. 228-241 (January 1999)
-
Myers, A.C.: JFlow: Practical mostly-static information flow control, In: POPL, pp. 228-241 (January 1999)
-
-
-
-
19
-
-
0036037318
-
-
Pottier, F., Simonet, V.: Information flow inference for ML. In: POPL, pp. 319-330. ACM, New York (2002)
-
Pottier, F., Simonet, V.: Information flow inference for ML. In: POPL, pp. 319-330. ACM, New York (2002)
-
-
-
-
21
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Shankar, U., Talwar, K., Foster, J.S., Wagner, D.: Detecting format string vulnerabilities with type qualifiers. In: Proceedings of the 10th conference on USENIX Security Symposium (2001)
-
(2001)
Proceedings of the 10th conference on USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
22
-
-
0002823436
-
Two approaches to interprocedural dataflow analysis
-
Prentice-Hall, Englewood Cliffs
-
Sharir, M., Pnueli, A.: Two approaches to interprocedural dataflow analysis. In: Program Flow Analysis: Theory and Applications, pp. 189-234. Prentice-Hall, Englewood Cliffs (1981)
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-234
-
-
Sharir, M.1
Pnueli, A.2
-
23
-
-
84947212539
-
Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS
-
Knudsen, L.R, ed, EURO CRYPT 2002, Springer, Heidelberg
-
Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EURO CRYPT 2002. LNCS, vol. 2332, pp. 534-546. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 534-546
-
-
Vaudenay, S.1
-
24
-
-
34249879570
-
Saturn: A scalable framework for error detection using boolean satisfiability
-
Xie, Y., Aiken, A.: Saturn: A scalable framework for error detection using boolean satisfiability. ACM Transactions on Programming Languages and Systems 29(3) (2007)
-
(2007)
ACM Transactions on Programming Languages and Systems
, vol.29
, Issue.3
-
-
Xie, Y.1
Aiken, A.2
-
25
-
-
85084161756
-
Using CQUAL for static analysis of authorization hook placement
-
USEN1X Association, Berkeley
-
Zhang, X., Edwards, A., Jaeger, T.: Using CQUAL for static analysis of authorization hook placement. In: Proceedings of the 11th USEN1X Security Symposium, pp. 33-48. USEN1X Association, Berkeley (2002)
-
(2002)
Proceedings of the 11th USEN1X Security Symposium
, pp. 33-48
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|