메뉴 건너뛰기




Volumn , Issue , 2005, Pages 50-57

Statically checking confidentiality via dynamic labels

Author keywords

(Higher Order) theorem proving; abstract interpretation; confidentiality; formal verification; static analysis

Indexed keywords

(HIGHER ORDER) THEOREM PROVING; ABSTRACT INTERPRETATIONS; FORMAL VERIFICATION; FORMAL VERIFICATIONS; HIGHER ORDER;

EID: 70349118502     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1045405.1045411     Document Type: Conference Paper
Times cited : (10)

References (27)
  • 1
    • 33749496386 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Roberto Gorrieri, editor, WITS. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS
    • Ádám Darvas, Reiner Hähnle, and Dave Sands. A theorem proving approach to analysis of secure information flow. In Roberto Gorrieri, editor, Workshop on Issues in the Theory of Security, WITS. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS, 2003.
    • (2003) Workshop on Issues in the Theory of Security
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 3
    • 1542285900 scopus 로고    scopus 로고
    • Java bytecode verification for secure information flow
    • Marco Avvenuti, Cinzia Bernardeschi, and Nicoletta De Francesco. Java bytecode verification for secure information flow. ACM SIGPLAN Notices, 38(12):20-27, 2003.
    • (2003) ACM SIGPLAN Notices , vol.38 , Issue.12 , pp. 20-27
    • Avvenuti, M.1    Bernardeschi, C.2    De Francesco, N.3
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-Based Access Control for Secure Information Flow
    • 200x. Special Issue on Language-Based Security, To appear
    • Anindya Banerjee and David A. Naumann. Stack-Based Access Control for Secure Information Flow. Journal of Functional Programming, 200x. Special Issue on Language-Based Security, To appear.
    • Journal of Functional Programming
    • Banerjee, A.1    Naumann, D.A.2
  • 5
    • 84944249026 scopus 로고    scopus 로고
    • Security Types Preserving Compilation
    • VMCAI'04 Proceedings, Springer, Berlin
    • Giles Barthe, Amitabh Basu, and Tamara Rezk. Security Types Preserving Compilation. In VMCAI'04 Proceedings, LNCS. Springer, Berlin, 2004.
    • (2004) LNCS
    • Barthe, G.1    Basu, A.2    Rezk, T.3
  • 8
    • 13144251735 scopus 로고    scopus 로고
    • Technical Report NIII-R0413, Nijmegen Institute for Computer and Information Sciences, available at
    • David R. Cok and Joseph R. Kiniry. ESC/Java2: Uniting ESC/Java and JML. Technical Report NIII-R0413, Nijmegen Institute for Computer and Information Sciences, 2004. available at http://www.cs.ru.nl/research/reports/info/NIII- R0413.html.
    • (2004) ESC/Java2: Uniting ESC/Java and JML
    • Cok, D.R.1    Kiniry, J.R.2
  • 9
    • 25844442786 scopus 로고    scopus 로고
    • ESC/Java2: Uniting ESC/Java and JML
    • Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices, Springer-Verlag, to appear. See the associated technical rapport [8]
    • David R. Cok and Joseph R. Kiniry. ESC/Java2: Uniting ESC/Java and JML. In Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices, LNCS. Springer-Verlag, to appear. See the associated technical rapport [8].
    • LNCS
    • Cok, D.R.1    Kiniry, J.R.2
  • 10
    • 0001502002 scopus 로고    scopus 로고
    • Abstract interpretation. Symposium on Models of Programming Languages and Computation
    • June
    • P. Cousot. Abstract interpretation. Symposium on Models of Programming Languages and Computation, ACM Computing Surveys, 28(2):324-328, June 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.2 , pp. 324-328
    • Cousot, P.1
  • 11
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • Los Angeles, California, ACM Press, New York, NY
    • P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ACM Press, New York, NY.
    • (1977) Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 12
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 15
    • 77953972229 scopus 로고    scopus 로고
    • Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation
    • Roberto Giacobazzi and Isabella Mastroeni. Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation. In POPL04 proceedings, 2004.
    • POPL04 Proceedings, 2004
    • Giacobazzi, R.1    Mastroeni, I.2
  • 16
    • 0020299523 scopus 로고
    • Security policies and security models
    • IEEE Comp. Soc. Press
    • J. Goguen and J. Meseguer. Security policies and security models. In IEEE Symp. on Security and Privacy, pages 11-20. IEEE Comp. Soc. Press, 1982.
    • (1982) IEEE Symp. on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 17
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K.R.M Leino. A semantic approach to secure information flow. Science of Comput. Progr., 37(1-3):113-138, 2000.
    • (2000) Science of Comput. Progr. , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 18
    • 0015672289 scopus 로고
    • A note on the Confinement Problem
    • Butler W. Lampson. A note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 20
    • 0029251055 scopus 로고
    • Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS
    • S. Owre, J.M. Rushby, N. Shankar, and F. von Henke. Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Trans. on Softw. Eng., 21(2):107-125, 1995.
    • (1995) IEEE Trans. on Softw. Eng. , vol.21 , Issue.2 , pp. 107-125
    • Owre, S.1    Rushby, J.M.2    Shankar, N.3    Von Henke, F.4
  • 21
    • 0003267035 scopus 로고
    • Isabelle: A Generic Theorem Prover
    • Springer Berlin
    • L.C. Paulson. Isabelle: A Generic Theorem Prover. Number 828 in LNCS. Springer, Berlin, 1994.
    • (1994) LNCS , vol.828
    • Paulson, L.C.1
  • 23
    • 77954016190 scopus 로고    scopus 로고
    • website
    • The PVS website, http://pvs.csl.sri.com/.
  • 26
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of computer security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 27
    • 84958749689 scopus 로고    scopus 로고
    • Security Typings by Abstract Interpretation
    • SAS, Springer-Verlag, September
    • M. Zanotti. Security Typings by Abstract Interpretation. In SAS, volume 2477 of LNCS, pages 360-375. Springer-Verlag, September 2002.
    • (2002) LNCS , vol.2477 , pp. 360-375
    • Zanotti, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.