-
1
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a java virtual machine
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In Annual Computer Security Applications Conference, pages 463-475, 2007.
-
(2007)
Annual Computer Security Applications Conference
, pp. 463-475
-
-
Chandra, D.1
Franz, M.2
-
5
-
-
67650851424
-
-
C. L. Goues and W. Weimer. Specification mining with few false positives. In Tools and Algorithms for the Construction and Analysis of Systems, 2009.
-
C. L. Goues and W. Weimer. Specification mining with few false positives. In Tools and Algorithms for the Construction and Analysis of Systems, 2009.
-
-
-
-
7
-
-
84945708698
-
An axiomatic basis for computer programming
-
October
-
C. A. R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 12:576-583, October 1969.
-
(1969)
Communications of the ACM
, vol.12
, pp. 576-583
-
-
Hoare, C.A.R.1
-
8
-
-
19944365247
-
Securing Web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the Conference on World Wide Web, pages 40-52, May 2004.
-
(2004)
Proceedings of the Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
10
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
Nov
-
T. Kremenek, P. Twohey, G. Back, A. Y. Ng, and D. R. Engler. From uncertainty to belief: Inferring the specification within. In Symposium on Operating Systems Design and Implementation, pages 161-176, Nov. 2006.
-
(2006)
Symposium on Operating Systems Design and Implementation
, pp. 161-176
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.Y.4
Engler, D.R.5
-
11
-
-
57749192483
-
Information flow control for standard os abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. In Proceedings of Symposium on Operating Systems Principles, pages 321-334, 2007.
-
(2007)
In Proceedings of Symposium on Operating Systems Principles
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
12
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
F. R. Kschischang, B. J. Frey, and H. A. Loeliger. Factor graphs and the sum-product algorithm. IEEE Transactions on Information Theory, 47(2):498-519, 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.A.3
-
13
-
-
32344452883
-
Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code. In Proceedings of the European Software Engineering Conference, 2005.
-
(2005)
Proceedings of the European Software Engineering Conference
-
-
Li, Z.1
Zhou, Y.2
-
17
-
-
31744432699
-
Finding application errors and security vulnerabilities using PQL: A program query language
-
Oct
-
M. Martin, B. Livshits, and M. S. Lam. Finding application errors and security vulnerabilities using PQL: a program query language. In Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications, Oct. 2005.
-
(2005)
Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
18
-
-
36448963891
-
SecuriFly: Runtime vulnerability protection for Web applications
-
Technical report, Stanford University, Oct
-
M. Martin, B. Livshits, and M. S. Lam. SecuriFly: Runtime vulnerability protection for Web applications. Technical report, Stanford University, Oct. 2006.
-
(2006)
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
21
-
-
67650797177
-
-
Microsoft Corporation. Microsoft Code Analysis Tool .NET (CAT.NET). http://www.microsoft. com/downloads/details.aspx?FamilyId= 0178e2ef-9da8-445e- 9348-c93f24cc9f9d&displaylang=en, 3 2009.
-
Microsoft Corporation. Microsoft Code Analysis Tool .NET (CAT.NET). http://www.microsoft. com/downloads/details.aspx?FamilyId= 0178e2ef-9da8-445e- 9348-c93f24cc9f9d&displaylang=en, 3 2009.
-
-
-
-
22
-
-
67650787293
-
-
T. Minka, J. Winn, J. Guiver, and A. Kannan. Infer.NET 2.2, 2009. Microsoft Research Cambridge. http://research.microsoft.com/infernet.
-
T. Minka, J. Winn, J. Guiver, and A. Kannan. Infer.NET 2.2, 2009. Microsoft Research Cambridge. http://research.microsoft.com/infernet.
-
-
-
-
23
-
-
84871349041
-
Automatically hardening Web applications using precise tainting
-
June
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening Web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, June 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
24
-
-
67650845233
-
-
OunceLabs, Inc
-
OunceLabs, Inc. Ounce. http://www.ouncelabs.com/, 2008.
-
(2008)
Ounce
-
-
-
26
-
-
35448936014
-
Static specification inference using predicate mining
-
M. K. Ramanathan, A. Grama, and S. Jagannathan. Static specification inference using predicate mining. In PLDI, 2007.
-
(2007)
PLDI
-
-
Ramanathan, M.K.1
Grama, A.2
Jagannathan, S.3
-
28
-
-
38849110791
-
The essence of command injection attacks in web applications
-
Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proceedings of POPL, 2006.
-
(2006)
Proceedings of POPL
-
-
Su, Z.1
Wassermann, G.2
-
29
-
-
37049002830
-
Labels and event processes in the Asbestos operating system
-
S. Vandebogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazières. Labels and event processes in the Asbestos operating system. ACM Trans. Comput. Syst., 25(4):11, 2007.
-
(2007)
ACM Trans. Comput. Syst
, vol.25
, Issue.4
, pp. 11
-
-
Vandebogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
30
-
-
67650832220
-
-
L. Wall. Perl security. http://search.cpan.org/dist/perl/ pod/perlsec.pod.
-
Perl security
-
-
Wall, L.1
-
33
-
-
33846480503
-
Static detection of security vulnerabilities in scripting languages
-
Aug
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the Usenix Security Symposium, pages 271-286, Aug. 2006.
-
(2006)
Proceedings of the Usenix Security Symposium
, pp. 271-286
-
-
Xie, Y.1
Aiken, A.2
-
36
-
-
84888352157
-
Making information flow explicit in HiStar
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazires. Making information flow explicit in HiStar. In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 263-278, 2006.
-
(2006)
Proceedings of the Symposium on Operating Systems Design and Implementation
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazires, D.4
|