메뉴 건너뛰기




Volumn 43, Issue 6, 2008, Pages 193-205

Quantitative information flow as network flow capacity

Author keywords

Dynamic analysis; Implicit flow; Information flow analysis

Indexed keywords

COMPUTER SOFTWARE; DYNAMIC ANALYSIS;

EID: 67650065318     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1379022.1375606     Document Type: Article
Times cited : (41)

References (58)
  • 5
    • 84937424951 scopus 로고    scopus 로고
    • BitValue inference: Detecting and exploiting narrow bitwidth computations
    • Munich, Germany, August 29-September 1
    • M. Budiu, M. Sakr, K. Walker, and S. C. Goldstein. BitValue inference: Detecting and exploiting narrow bitwidth computations. In European Conference on Parallel Processing, pages 969-979, Munich, Germany, August 29-September 1, 2000.
    • (2000) European Conference on Parallel Processing , pp. 969-979
    • Budiu, M.1    Sakr, M.2    Walker, K.3    Goldstein, S.C.4
  • 6
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a Java virtual machine
    • Miami Beach, FL, USA, December 10-14
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In 23rd Annual Computer Security Applications Conference, pages 463-475, Miami Beach, FL, USA, December 10-14, 2007.
    • (2007) 23rd Annual Computer Security Applications Conference , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 15
    • 0003969633 scopus 로고
    • Department of Defense Computer Security Center, August, CSC-STD-001-83
    • Department of Defense Computer Security Center. Trusted Computer System Evaluation Criteria, August 1983. CSC-STD-001-83.
    • (1983) Trusted Computer System Evaluation Criteria
  • 18
    • 33845414042 scopus 로고    scopus 로고
    • P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, Brighton, UK, October 32-26, 2005.
    • P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, Brighton, UK, October 32-26, 2005.
  • 19
    • 0016382977 scopus 로고
    • Memoryless subsytems
    • May
    • J. S. Fenton. Memoryless subsytems. The Computer Journal, 17(2):143-147, May 1974.
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 20
    • 0030708182 scopus 로고    scopus 로고
    • Providing flexibility in information flow control for object-oriented systems
    • Oakland, CA, USA, May 4-7
    • E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia. Providing flexibility in information flow control for object-oriented systems. In 1997 IEEE Symposium on Security and Privacy, pages 130-140, Oakland, CA, USA, May 4-7, 1997.
    • (1997) 1997 IEEE Symposium on Security and Privacy , pp. 130-140
    • Ferrari, E.1    Samarati, P.2    Bertino, E.3    Jajodia, S.4
  • 21
    • 0017014045 scopus 로고
    • Memoryless execution: A programmer's viewpoint
    • I. Gat and H. J. Saal. Memoryless execution: A programmer's viewpoint. Software: Practice and Experience, 6(4):463-471, 1976.
    • (1976) Software: Practice and Experience , vol.6 , Issue.4 , pp. 463-471
    • Gat, I.1    Saal, H.J.2
  • 23
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow security
    • Oakland, CA, USA, May 20-22
    • J. W. Gray III. Toward a mathematical foundation for information flow security. In 1991 IEEE Symposium on Research in Security and Privacy, pages 21-34, Oakland, CA, USA, May 20-22, 1991.
    • (1991) 1991 IEEE Symposium on Research in Security and Privacy , pp. 21-34
    • Gray III, J.W.1
  • 24
    • 67650033613 scopus 로고    scopus 로고
    • M. Herrb. X.org security advisory: multiple integer overflows in DBE and Render extensions, January 2007. http://lists.freedesktop.org/archives/xorg- announce/2007-January/000235.html.
    • M. Herrb. X.org security advisory: multiple integer overflows in DBE and Render extensions, January 2007. http://lists.freedesktop.org/archives/xorg- announce/2007-January/000235.html.
  • 25
    • 39049162501 scopus 로고    scopus 로고
    • From languages to systems: Understanding practical application development in security-typed languages
    • Miami Beach, FL, USA, December 11-15
    • B. Hicks, K. Ahmadizadeh, and P. McDaniel. From languages to systems: Understanding practical application development in security-typed languages. In Proceedings of the 2006 Annual Computer Security Applications Conference, pages 153-164, Miami Beach, FL, USA, December 11-15, 2006.
    • (2006) Proceedings of the 2006 Annual Computer Security Applications Conference , pp. 153-164
    • Hicks, B.1    Ahmadizadeh, K.2    McDaniel, P.3
  • 26
    • 85084162336 scopus 로고    scopus 로고
    • Secure execution via program shepherding
    • San Francisco, CA, USA, August 7-9
    • V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In 11th USENIX Security Symposium, pages 191-206, San Francisco, CA, USA, August 7-9, 2002.
    • (2002) 11th USENIX Security Symposium , pp. 191-206
    • Kiriansky, V.1    Bruening, D.2    Amarasinghe, S.3
  • 28
    • 84948775168 scopus 로고    scopus 로고
    • Quantifiying information flow
    • Cape Breton, Nova Scotia, Canada, June 24-26
    • G. Lowe. Quantifiying information flow. In 15th IEEE Computer Security Foundations Workshop, pages 18-31, Cape Breton, Nova Scotia, Canada, June 24-26, 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 18-31
    • Lowe, G.1
  • 31
    • 57349171530 scopus 로고    scopus 로고
    • PhD thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, June
    • S. McCamant. Quantitative Information-Flow Tracking for Real Systems. PhD thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, June 2008.
    • (2008) Quantitative Information-Flow Tracking for Real Systems
    • McCamant, S.1
  • 32
    • 67650077902 scopus 로고    scopus 로고
    • S. McCamant and M. D. Ernst. Quantitative information-flow tracking for C and related languages. Technical Report MIT-CSAIL-TR-2006-076, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, November 17, 2006.
    • S. McCamant and M. D. Ernst. Quantitative information-flow tracking for C and related languages. Technical Report MIT-CSAIL-TR-2006-076, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, November 17, 2006.
  • 33
    • 67650089079 scopus 로고    scopus 로고
    • S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. Technical Report MIT-CSAIL-TR-2007-057, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, December 10, 2007.
    • S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. Technical Report MIT-CSAIL-TR-2007-057, MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, December 10, 2007.
  • 41
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • San Diego, CA, USA, February 3-4
    • J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Annual Symposium on Network and Distributed System Security, San Diego, CA, USA, February 3-4, 2005.
    • (2005) Annual Symposium on Network and Distributed System Security
    • Newsome, J.1    Song, D.2
  • 42
    • 57349154464 scopus 로고    scopus 로고
    • Influence: A quantitative approach for data integrity
    • Technical Report CMU-CyLab-08-005, Carnegie Mellon University CyLab, February 2008
    • J. Newsome and D. Song. Influence: A quantitative approach for data integrity. Technical Report CMU-CyLab-08-005, Carnegie Mellon University CyLab, February 2008.
    • Newsome, J.1    Song, D.2
  • 45
    • 40349087553 scopus 로고    scopus 로고
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 135-148, Orlando, FL, USA, December 9-13, 2006.
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 135-148, Orlando, FL, USA, December 9-13, 2006.
  • 46
    • 24144458954 scopus 로고    scopus 로고
    • A. S?alcianu and M. C. Rinard. Purity and side-effect analysis for Java programs. In VMCAI'05, Sixth International Conference on Verification, Model Checking and Abstract Interpretation, pages 199-215, Paris, France, January 17-19, 2005.
    • A. S?alcianu and M. C. Rinard. Purity and side-effect analysis for Java programs. In VMCAI'05, Sixth International Conference on Verification, Model Checking and Abstract Interpretation, pages 199-215, Paris, France, January 17-19, 2005.
  • 47
    • 77953988297 scopus 로고    scopus 로고
    • Using Valgrind to detect undefined value errors with bit-precision
    • Anaheim, CA, USA, April 10-15
    • J. Seward and N. Nethercote. Using Valgrind to detect undefined value errors with bit-precision. In Proceedings of the 2005 USENIX Annual Technical Conference, pages 17-30, Anaheim, CA, USA, April 10-15, 2005.
    • (2005) Proceedings of the 2005 USENIX Annual Technical Conference , pp. 17-30
    • Seward, J.1    Nethercote, N.2
  • 53
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • December
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, December 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 55
    • 67650022290 scopus 로고    scopus 로고
    • D. P. Wiggins. Security Extension Specification. X Consortium, Inc., November 1996.
    • D. P. Wiggins. Security Extension Specification. X Consortium, Inc., November 1996.
  • 56
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Vancouver, BC, Canada, August 2-4
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, pages 121-136, Vancouver, BC, Canada, August 2-4, 2006.
    • (2006) 15th USENIX Security Symposium , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.