-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network information flow. IEEE Transactions on Information Theory, 46(4):1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Milan, Italy, September 12-14
-
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proceedings of the 10th European Symposium On Research In Computer Security (LNCS 3679), pages 197-221, Milan, Italy, September 12-14, 2005.
-
(2005)
Proceedings of the 10th European Symposium On Research In Computer Security (LNCS 3679)
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
3
-
-
0024766883
-
Incremental planarity testing
-
Research Triangle Park, NC, USA, October 30-November 1
-
G. D. Battista and R. Tamassia. Incremental planarity testing. In 30th Annual Symposium on Foundations of Computer Science, pages 436-441, Research Triangle Park, NC, USA, October 30-November 1, 1989.
-
(1989)
30th Annual Symposium on Foundations of Computer Science
, pp. 436-441
-
-
Battista, G.D.1
Tamassia, R.2
-
4
-
-
42149117768
-
Probabilistic calling context
-
Montréal, Canada, October 23-25
-
M. D. Bond and K. S. McKinley. Probabilistic calling context. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA 2007), pages 97-112, Montréal, Canada, October 23-25, 2007.
-
(2007)
Object-Oriented Programming Systems, Languages, and Applications (OOPSLA 2007)
, pp. 97-112
-
-
Bond, M.D.1
McKinley, K.S.2
-
5
-
-
84937424951
-
BitValue inference: Detecting and exploiting narrow bitwidth computations
-
Munich, Germany, August 29-September 1
-
M. Budiu, M. Sakr, K. Walker, and S. C. Goldstein. BitValue inference: Detecting and exploiting narrow bitwidth computations. In European Conference on Parallel Processing, pages 969-979, Munich, Germany, August 29-September 1, 2000.
-
(2000)
European Conference on Parallel Processing
, pp. 969-979
-
-
Budiu, M.1
Sakr, M.2
Walker, K.3
Goldstein, S.C.4
-
6
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a Java virtual machine
-
Miami Beach, FL, USA, December 10-14
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In 23rd Annual Computer Security Applications Conference, pages 463-475, Miami Beach, FL, USA, December 10-14, 2007.
-
(2007)
23rd Annual Computer Security Applications Conference
, pp. 463-475
-
-
Chandra, D.1
Franz, M.2
-
7
-
-
0027311335
-
Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects
-
Charleston, SC, January
-
J.-D. Choi, M. Burke, and P. Carini. Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects. In Proceedings of the Twentieth Annual ACM SIGPLAN-SIGACTSymposium on Principles of Programming Languages, pages 232-245, Charleston, SC, January 1993.
-
(1993)
Proceedings of the Twentieth Annual ACM SIGPLAN-SIGACTSymposium on Principles of Programming Languages
, pp. 232-245
-
-
Choi, J.-D.1
Burke, M.2
Carini, P.3
-
8
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
San Diego, CA, USA, August 11-13
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In 13th USENIX Security Symposium, pages 321-336, San Diego, CA, USA, August 11-13, 2004.
-
(2004)
13th USENIX Security Symposium
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
9
-
-
11344288540
-
Quantified interference for a while language
-
Barcelona, Spain, March 27-28
-
D. Clark, S. Hunt, and P. Malacaria. Quantified interference for a while language. In Proceedings of the 2nd Workshop on Quantitative Aspects of Programming Languages (ENTCS 112), pages 149-159, Barcelona, Spain, March 27-28, 2004.
-
(2004)
Proceedings of the 2nd Workshop on Quantitative Aspects of Programming Languages (ENTCS 112)
, pp. 149-159
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
10
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
London, UK, July 10-12
-
J. Clause, W. Li, and A. Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA 2007, Proceedings of the 2007 International Symposium on Software Testing and Analysis, pages 196-206, London, UK, July 10-12, 2007.
-
(2007)
ISSTA 2007, Proceedings of the 2007 International Symposium on Software Testing and Analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
11
-
-
0004116989
-
Introduction to Algorithms
-
MIT Press and McGraw-Hill, Cambridge, Massachusetts and New York, New York
-
T. H. Cormen, C. E. Leiserson, and R. L. Rivest. Introduction to Algorithms. MIT Electrical Engineering and Computer Science Series. MIT Press and McGraw-Hill, Cambridge, Massachusetts and New York, New York, 1990.
-
(1990)
MIT Electrical Engineering and Computer Science Series
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0003969633
-
-
Department of Defense Computer Security Center, August, CSC-STD-001-83
-
Department of Defense Computer Security Center. Trusted Computer System Evaluation Criteria, August 1983. CSC-STD-001-83.
-
(1983)
Trusted Computer System Evaluation Criteria
-
-
-
16
-
-
84948746951
-
Approximate noninterference
-
Cape Breton, Nova Scotia, Canada, June 24-26
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate noninterference. In 15th IEEE Computer Security Foundations Workshop, pages 3-17, Cape Breton, Nova Scotia, Canada, June 24-26, 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 3-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
17
-
-
85084164001
-
Flayer: Exposing application internals
-
Boston, MA, USA, August 6
-
W Drewry and T. Ormandy. Flayer: Exposing application internals. In First USENIX Workshop on Offensive Technologies, Boston, MA, USA, August 6, 2007.
-
(2007)
First USENIX Workshop on Offensive Technologies
-
-
Drewry, W.1
Ormandy, T.2
-
18
-
-
33845414042
-
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, Brighton, UK, October 32-26, 2005.
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, Brighton, UK, October 32-26, 2005.
-
-
-
-
19
-
-
0016382977
-
Memoryless subsytems
-
May
-
J. S. Fenton. Memoryless subsytems. The Computer Journal, 17(2):143-147, May 1974.
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
20
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
Oakland, CA, USA, May 4-7
-
E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia. Providing flexibility in information flow control for object-oriented systems. In 1997 IEEE Symposium on Security and Privacy, pages 130-140, Oakland, CA, USA, May 4-7, 1997.
-
(1997)
1997 IEEE Symposium on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
21
-
-
0017014045
-
Memoryless execution: A programmer's viewpoint
-
I. Gat and H. J. Saal. Memoryless execution: A programmer's viewpoint. Software: Practice and Experience, 6(4):463-471, 1976.
-
(1976)
Software: Practice and Experience
, vol.6
, Issue.4
, pp. 463-471
-
-
Gat, I.1
Saal, H.J.2
-
22
-
-
0020299523
-
Security policies and security models
-
Oakland, CA, USA, April 26-28
-
J. A. Goguen and J. Meseguer. Security policies and security models. In 1982 IEEE Symposium on Security and Privacy, pages 11-20, Oakland, CA, USA, April 26-28, 1982.
-
(1982)
1982 IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
23
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
Oakland, CA, USA, May 20-22
-
J. W. Gray III. Toward a mathematical foundation for information flow security. In 1991 IEEE Symposium on Research in Security and Privacy, pages 21-34, Oakland, CA, USA, May 20-22, 1991.
-
(1991)
1991 IEEE Symposium on Research in Security and Privacy
, pp. 21-34
-
-
Gray III, J.W.1
-
24
-
-
67650033613
-
-
M. Herrb. X.org security advisory: multiple integer overflows in DBE and Render extensions, January 2007. http://lists.freedesktop.org/archives/xorg- announce/2007-January/000235.html.
-
M. Herrb. X.org security advisory: multiple integer overflows in DBE and Render extensions, January 2007. http://lists.freedesktop.org/archives/xorg- announce/2007-January/000235.html.
-
-
-
-
25
-
-
39049162501
-
From languages to systems: Understanding practical application development in security-typed languages
-
Miami Beach, FL, USA, December 11-15
-
B. Hicks, K. Ahmadizadeh, and P. McDaniel. From languages to systems: Understanding practical application development in security-typed languages. In Proceedings of the 2006 Annual Computer Security Applications Conference, pages 153-164, Miami Beach, FL, USA, December 11-15, 2006.
-
(2006)
Proceedings of the 2006 Annual Computer Security Applications Conference
, pp. 153-164
-
-
Hicks, B.1
Ahmadizadeh, K.2
McDaniel, P.3
-
26
-
-
85084162336
-
Secure execution via program shepherding
-
San Francisco, CA, USA, August 7-9
-
V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In 11th USENIX Security Symposium, pages 191-206, San Francisco, CA, USA, August 7-9, 2002.
-
(2002)
11th USENIX Security Symposium
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
27
-
-
33947630856
-
Encoding information flow in Haskell
-
Venice, Italy, July 5-6
-
P. Li and S. Zdancewic. Encoding information flow in Haskell. In 19th IEEE Computer Security Foundations Workshop, pages 16-27, Venice, Italy, July 5-6, 2006.
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 16-27
-
-
Li, P.1
Zdancewic, S.2
-
28
-
-
84948775168
-
Quantifiying information flow
-
Cape Breton, Nova Scotia, Canada, June 24-26
-
G. Lowe. Quantifiying information flow. In 15th IEEE Computer Security Foundations Workshop, pages 18-31, Cape Breton, Nova Scotia, Canada, June 24-26, 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 18-31
-
-
Lowe, G.1
-
30
-
-
16244362392
-
Detecting and debugging insecure information flows
-
Saint-Malo, France, November 3-5
-
W. Masri, A. Podgurski, and D. Leon. Detecting and debugging insecure information flows. In Fifteenth International Symposium on Software Reliability Engineering, pages 198-209, Saint-Malo, France, November 3-5, 2004.
-
(2004)
Fifteenth International Symposium on Software Reliability Engineering
, pp. 198-209
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
31
-
-
57349171530
-
-
PhD thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, June
-
S. McCamant. Quantitative Information-Flow Tracking for Real Systems. PhD thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, June 2008.
-
(2008)
Quantitative Information-Flow Tracking for Real Systems
-
-
McCamant, S.1
-
32
-
-
67650077902
-
-
S. McCamant and M. D. Ernst. Quantitative information-flow tracking for C and related languages. Technical Report MIT-CSAIL-TR-2006-076, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, November 17, 2006.
-
S. McCamant and M. D. Ernst. Quantitative information-flow tracking for C and related languages. Technical Report MIT-CSAIL-TR-2006-076, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, November 17, 2006.
-
-
-
-
33
-
-
67650089079
-
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. Technical Report MIT-CSAIL-TR-2007-057, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, December 10, 2007.
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. Technical Report MIT-CSAIL-TR-2007-057, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, December 10, 2007.
-
-
-
-
34
-
-
36448929074
-
A simulation-based proof technique for dynamic information flow
-
San Diego, California, USA, June 14
-
S. McCamant and M. D. Ernst. A simulation-based proof technique for dynamic information flow. In PLAS 2007: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, pages 41-46, San Diego, California, USA, June 14, 2007.
-
(2007)
PLAS 2007: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
, pp. 41-46
-
-
McCamant, S.1
Ernst, M.D.2
-
36
-
-
0031543270
-
A decentralized model for information flow control
-
St. Malo, France, October 5-8
-
A. C. Myers and B. Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 129-142, St. Malo, France, October 5-8, 1997.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
37
-
-
57349111362
-
A virtual machine based information flow control system for policy enforcement
-
Dresden, Germany, September 27
-
S. K. Nair, P. N. Simpson, B. Crispo, and A. S. Tannenbaum. A virtual machine based information flow control system for policy enforcement. In The First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, pages 3-16, Dresden, Germany, September 27, 2007.
-
(2007)
The First International Workshop on Run Time Enforcement for Mobile and Distributed Systems
, pp. 3-16
-
-
Nair, S.K.1
Simpson, P.N.2
Crispo, B.3
Tannenbaum, A.S.4
-
38
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
Grenoble, France, April 8-12
-
G. C. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Compiler Construction: 11th International Conference, CC2002, pages 213-228, Grenoble, France, April 8-12, 2002.
-
(2002)
Compiler Construction: 11th International Conference, CC2002
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
39
-
-
33847333146
-
Redux: A dynamic dataflow tracer
-
Boulder, CO, USA, July 13
-
N. Nethercote and A. Mycroft. Redux: A dynamic dataflow tracer. In Proceedings of the Third Workshop on Runtime Verification, Boulder, CO, USA, July 13, 2003.
-
(2003)
Proceedings of the Third Workshop on Runtime Verification
-
-
Nethercote, N.1
Mycroft, A.2
-
40
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary insrumentation
-
San Diego, CA, USA, June 11-13
-
N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary insrumentation. In Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, pages 89-100, San Diego, CA, USA, June 11-13, 2007.
-
(2007)
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
41
-
-
79953672829
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
San Diego, CA, USA, February 3-4
-
J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Annual Symposium on Network and Distributed System Security, San Diego, CA, USA, February 3-4, 2005.
-
(2005)
Annual Symposium on Network and Distributed System Security
-
-
Newsome, J.1
Song, D.2
-
42
-
-
57349154464
-
Influence: A quantitative approach for data integrity
-
Technical Report CMU-CyLab-08-005, Carnegie Mellon University CyLab, February 2008
-
J. Newsome and D. Song. Influence: A quantitative approach for data integrity. Technical Report CMU-CyLab-08-005, Carnegie Mellon University CyLab, February 2008.
-
-
-
Newsome, J.1
Song, D.2
-
43
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Chiba, Japan, May 30-June 1
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In 20th IFIP International Information Security Conference, pages 295-307, Chiba, Japan, May 30-June 1, 2005.
-
(2005)
20th IFIP International Information Security Conference
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
44
-
-
36549046024
-
Interstatement must aliases for data dependence analysis of heap locations
-
San Diego, CA, USA, June 13-14
-
J. Qian, B. Xu, and H. Min. Interstatement must aliases for data dependence analysis of heap locations. In ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2007), pages 17-23, San Diego, CA, USA, June 13-14, 2007.
-
(2007)
ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2007)
, pp. 17-23
-
-
Qian, J.1
Xu, B.2
Min, H.3
-
45
-
-
40349087553
-
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 135-148, Orlando, FL, USA, December 9-13, 2006.
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 135-148, Orlando, FL, USA, December 9-13, 2006.
-
-
-
-
46
-
-
24144458954
-
-
A. S?alcianu and M. C. Rinard. Purity and side-effect analysis for Java programs. In VMCAI'05, Sixth International Conference on Verification, Model Checking and Abstract Interpretation, pages 199-215, Paris, France, January 17-19, 2005.
-
A. S?alcianu and M. C. Rinard. Purity and side-effect analysis for Java programs. In VMCAI'05, Sixth International Conference on Verification, Model Checking and Abstract Interpretation, pages 199-215, Paris, France, January 17-19, 2005.
-
-
-
-
47
-
-
77953988297
-
Using Valgrind to detect undefined value errors with bit-precision
-
Anaheim, CA, USA, April 10-15
-
J. Seward and N. Nethercote. Using Valgrind to detect undefined value errors with bit-precision. In Proceedings of the 2005 USENIX Annual Technical Conference, pages 17-30, Anaheim, CA, USA, April 10-15, 2005.
-
(2005)
Proceedings of the 2005 USENIX Annual Technical Conference
, pp. 17-30
-
-
Seward, J.1
Nethercote, N.2
-
49
-
-
33745938077
-
Refactoring programs to secure information flows
-
Ottawa, Canada, June 10
-
S. Smith and M. Thober. Refactoring programs to secure information flows. In PLAS 2006: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, pages 75-84, Ottawa, Canada, June 10, 2006.
-
(2006)
PLAS 2006: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
, pp. 75-84
-
-
Smith, S.1
Thober, M.2
-
50
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Boston, Massachusetts, USA, October 7-13
-
G. E. Suh, J. W Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, Boston, Massachusetts, USA, October 7-13, 2004.
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
51
-
-
85027866215
-
Dynamic native optimization of interpreters
-
San Diego, California, USA, June 12
-
G. T. Sullivan, D. L. Bruening, I. Baron, T. Garnett, and S. Amarasinghe. Dynamic native optimization of interpreters. In ACM SIGPLAN 2003 Workshop on Interpreters, Virtual Machines and Emulators, pages 50-57, San Diego, California, USA, June 12, 2003.
-
(2003)
ACM SIGPLAN 2003 Workshop on Interpreters, Virtual Machines and Emulators
, pp. 50-57
-
-
Sullivan, G.T.1
Bruening, D.L.2
Baron, I.3
Garnett, T.4
Amarasinghe, S.5
-
52
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
Portland, OR, USA, December 4-8
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-flow security. In Proceedings of the 37th Annual IEEE/ACM International Symposium on Microarchitecture, pages 243-254, Portland, OR, USA, December 4-8, 2004.
-
(2004)
Proceedings of the 37th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
53
-
-
0030370740
-
A sound type system for secure flow analysis
-
December
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, December 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
55
-
-
67650022290
-
-
D. P. Wiggins. Security Extension Specification. X Consortium, Inc., November 1996.
-
D. P. Wiggins. Security Extension Specification. X Consortium, Inc., November 1996.
-
-
-
-
56
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Vancouver, BC, Canada, August 2-4
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, pages 121-136, Vancouver, BC, Canada, August 2-4, 2006.
-
(2006)
15th USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
57
-
-
84991934426
-
TightLip: Keeping applications from spilling the beans
-
Cambridge, MA, USA, April 11-13
-
A. R. Yumerfendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In 4th USENIX Symposium on Networked Systems Design and Implementation, pages 159-172, Cambridge, MA, USA, April 11-13, 2007.
-
(2007)
4th USENIX Symposium on Networked Systems Design and Implementation
, pp. 159-172
-
-
Yumerfendi, A.R.1
Mickle, B.2
Cox, L.P.3
-
58
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, USA, November 6-8
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In USENIX 7th Symposium on OS Design and Implementation, pages 263-278, Seattle, WA, USA, November 6-8, 2006.
-
(2006)
USENIX 7th Symposium on OS Design and Implementation
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|