-
1
-
-
84869527851
-
-
sites, November
-
English: Alexa top 100 sites, November 2008. http://www.alexa. com/.
-
(2008)
Alexa top
, vol.100
-
-
English1
-
2
-
-
84871644299
-
-
November 2008
-
Google web toolkit, November 2008. http://code.google.com/ webtoolkit/.
-
Google web toolkit
-
-
-
3
-
-
84869527850
-
-
November
-
Jsure, November 2008. http://www.jsure.org/.
-
(2008)
-
-
-
4
-
-
84869532784
-
-
November
-
Volta, November 2008. http://live.labs.com/volta.
-
(2008)
-
-
Volta1
-
5
-
-
35048839749
-
Information flow analysis in logical form
-
T. Amtoft and A. Banerjee. Information flow analysis in logical form. In SAS, pages 100-115, 2004.
-
(2004)
SAS
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
7
-
-
41149124878
-
Secure web application via automatic partitioning
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web application via automatic partitioning. In SOSP, pages 31-44, 2007.
-
(2007)
SOSP
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
8
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security Symposium, pages 321-336, 2004.
-
(2004)
USENIX Security Symposium
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
9
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Maziéres, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In SOSP. ACM, 2005.
-
(2005)
SOSP
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Maziéres, D.7
Kaashoek, F.8
Morris, R.9
-
10
-
-
85017248930
-
Program analysis using mixed term and set constraints
-
M. Fähndrich and A. Aiken. Program analysis using mixed term and set constraints. In SAS, pages 114-126, 1997.
-
(1997)
SAS
, pp. 114-126
-
-
Fähndrich, M.1
Aiken, A.2
-
11
-
-
4243972567
-
Tracking down exceptions in standard ml programs
-
Technical report, EECS Department, UC Berkeley
-
M. Fähndrich, J. S. Foster, A. Aiken, and J. Cu. Tracking down exceptions in standard ml programs. Technical report, EECS Department, UC Berkeley, 1998.
-
(1998)
-
-
Fähndrich, M.1
Foster, J.S.2
Aiken, A.3
Cu, J.4
-
14
-
-
84869532781
-
-
J. S. Foster, M. Fähndrich, and A. Aiken. Polymorphic versus monomorphic flow-insensitive points-to analysis for c. In SAS, 2000.
-
J. S. Foster, M. Fähndrich, and A. Aiken. Polymorphic versus monomorphic flow-insensitive points-to analysis for c. In SAS, 2000.
-
-
-
-
16
-
-
35448946037
-
The ant and the grasshopper: Fast and accurate pointer analysis for millions of lines of code
-
B. Hardekopf and C. Lin. The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. In PLDI, 2007.
-
(2007)
PLDI
-
-
Hardekopf, B.1
Lin, C.2
-
17
-
-
38849182183
-
Status report: Specifying javascript with ml
-
D. Herman and C. Flanagan. Status report: specifying javascript with ml. In ML, pages 47-52, 2007.
-
(2007)
ML
, pp. 47-52
-
-
Herman, D.1
Flanagan, C.2
-
18
-
-
35348860223
-
-
T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In WWW, 2007.
-
T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In WWW, 2007.
-
-
-
-
20
-
-
33646044421
-
Banshee: A scalable constraint-based analysis toolkit
-
J. Kodumal and A. Aiken. Banshee: A scalable constraint-based analysis toolkit. In SAS, pages 218-234, 2005.
-
(2005)
SAS
, pp. 218-234
-
-
Kodumal, J.1
Aiken, A.2
-
21
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
M. S. Lam, M. Martin, V. B. Livshits, and J. Whaley. Securing web applications with static and dynamic information flow tracking. In PEPM, pages 3-12, 2008.
-
(2008)
PEPM
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, V.B.3
Whaley, J.4
-
22
-
-
67650832221
-
Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
-
Technical Report MSR-TR-2009-16, Microsoft Research, Feb
-
B. Livshits and S. Guarnieri. Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code. Technical Report MSR-TR-2009-16, Microsoft Research, Feb. 2009.
-
(2009)
-
-
Livshits, B.1
Guarnieri, S.2
-
23
-
-
24644460258
-
Programming with explicit security policies
-
A. C. Myers. Programming with explicit security policies. In ESOP, pages 1-4, 2005.
-
(2005)
ESOP
, pp. 1-4
-
-
Myers, A.C.1
-
24
-
-
33745789492
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.X.2
-
25
-
-
0036037318
-
Information flow inference for ml
-
F. Pottier and V. Simonet. Information flow inference for ml. In POPL, pages 319-330, 2002.
-
(2002)
POPL
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
26
-
-
33745201521
-
Locksmith: Context-sensitive correlation analysis for race detection
-
ACM
-
P. Pratikakis, J. S. Foster, and M. Hicks. Locksmith: context-sensitive correlation analysis for race detection. In PLDI. ACM, 2006.
-
(2006)
PLDI
-
-
Pratikakis, P.1
Foster, J.S.2
Hicks, M.3
-
27
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In HotBots, 2007.
-
(2007)
HotBots
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
29
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, 2004.
-
(2004)
ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
30
-
-
33646037706
-
Secure information flow as a safety problem
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, pages 352-367, 2005.
-
(2005)
SAS
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
31
-
-
24644446108
-
Towards a type system for analyzing javascript programs
-
P. Thiemann. Towards a type system for analyzing javascript programs. In ESOP, pages 408-422, 2005.
-
(2005)
ESOP
, pp. 408-422
-
-
Thiemann, P.1
-
32
-
-
21644475650
-
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO, 2004.
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO, 2004.
-
-
-
-
33
-
-
0033705210
-
Verifying secrets and relative secrecy
-
D. Volpano and G. Smith. Verifying secrets and relative secrecy. In POPL, 2000.
-
(2000)
POPL
-
-
Volpano, D.1
Smith, G.2
-
34
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
G. Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE, pages 171-180, 2008.
-
(2008)
ICSE
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
-
35
-
-
17044371129
-
Scalable error detection using boolean satisfiability
-
Y. Xie and A. Aiken. Scalable error detection using boolean satisfiability. In POPL, pages 351-363, 2005.
-
(2005)
POPL
, pp. 351-363
-
-
Xie, Y.1
Aiken, A.2
-
36
-
-
33846497980
-
Javascript instrumentation for browser security
-
D. Yu, A. Chander, N. Islam, and I. Serikov. Javascript instrumentation for browser security. In POPL, pages 237-249, 2007.
-
(2007)
POPL
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
-
37
-
-
85094632142
-
Securing distributed systems with information flow control
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In NSDI, 2008.
-
(2008)
NSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
|