메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 86-103

Tracking information flow in dynamic tree structures

Author keywords

[No Author keywords available]

Indexed keywords

DOCUMENT OBJECT MODEL; DYNAMIC NATURE; DYNAMIC TREES; ENFORCEMENT MECHANISMS; INFORMATION FLOWS; RUNTIMES; SENSITIVE INFORMATIONS; TREE OPERATIONS; TREE STRUCTURES;

EID: 70350355123     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_6     Document Type: Conference Paper
Times cited : (42)

References (39)
  • 1
    • 57049111067 scopus 로고    scopus 로고
    • Termination-insensitive noninterference leaks more than just a bit
    • Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
    • Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333-348. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 333-348
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 2
    • 70350542799 scopus 로고    scopus 로고
    • Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
    • Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
  • 3
    • 70450239729 scopus 로고    scopus 로고
    • Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)
    • Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)
  • 4
    • 67650663465 scopus 로고    scopus 로고
    • Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, 5491, pp. 20-34. Springer, Heidelberg (2009)
    • Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20-34. Springer, Heidelberg (2009)
  • 5
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
    • Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 6
    • 48649085342 scopus 로고    scopus 로고
    • Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: Proc. Annual Computer Security Applications Conference, December 2007, pp. 463-475 (2007)
    • Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: Proc. Annual Computer Security Applications Conference, December 2007, pp. 463-475 (2007)
  • 7
    • 41149124878 scopus 로고    scopus 로고
    • Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, October 2007, pp. 31-44 (2007)
    • Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, October 2007, pp. 31-44 (2007)
  • 10
    • 70350430365 scopus 로고    scopus 로고
    • Crockford, D.: Making javascript safe for advertising. adsafe.org (2009)
    • Crockford, D.: Making javascript safe for advertising. adsafe.org (2009)
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 84869644897 scopus 로고    scopus 로고
    • Facebook. FBJS (2009), http://wiki.developers.facebook.com/index.php/FBJS
    • (2009)
  • 13
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton, J.S.: Memoryless subsystems. Computing J. 17(2), 143-147 (1974)
    • (1974) Computing J , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 14
    • 70350381463 scopus 로고    scopus 로고
    • Google. Google Chrome (2009), http://www.google.com/chrome/
    • (2009) Google Chrome
  • 15
    • 70350405279 scopus 로고    scopus 로고
    • Google. Google Web Toolkit (2009), http://code.google.com/webtoolkit
    • (2009) Google Web Toolkit
  • 16
    • 0031701347 scopus 로고    scopus 로고
    • Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 365-377 (1998)
    • Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 365-377 (1998)
  • 17
    • 19944365247 scopus 로고    scopus 로고
    • Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40-52 (2004)
    • Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40-52 (2004)
  • 18
    • 48349136934 scopus 로고    scopus 로고
    • On JavaScript malware and related threats
    • Johns, M.: On JavaScript malware and related threats. Journal in Computer Virology 4(3), 161-178 (2008)
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 161-178
    • Johns, M.1
  • 21
    • 49949102660 scopus 로고    scopus 로고
    • Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 75-89. Springer, Heidelberg (2008)
    • Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 75-89. Springer, Heidelberg (2008)
  • 25
    • 70350381473 scopus 로고    scopus 로고
    • Netscape. Using data tainting for security (2006), http://wp.netscape. com/eng/mozilla/3.0/handbook/javascript/advtopic.htm
    • (2006) Using data tainting for security
  • 27
    • 63149101516 scopus 로고    scopus 로고
    • A library for light-weight information-flow security in Haskell
    • ACM Press, New York
    • Russo, A., Claessen, K., Hughes, J.: A library for light-weight information-flow security in Haskell. In: Proc. ACM SIGPLAN Symposium on Haskell, pp. 13-24. ACM Press, New York (2008)
    • (2008) Proc. ACM SIGPLAN Symposium on Haskell , pp. 13-24
    • Russo, A.1    Claessen, K.2    Hughes, J.3
  • 28
    • 70350521681 scopus 로고    scopus 로고
    • Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
    • Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
  • 31
    • 84860313876 scopus 로고    scopus 로고
    • From dynamic to static and back: Riding the roller coaster of information-flow control research
    • PSI, Springer, Heidelberg to appear
    • Sabelfeld, A., Russo, A.: From dynamic to static and back: Riding the roller coaster of information-flow control research. In: PSI 2009. LNCS. Springer, Heidelberg (to appear)
    • (2009) LNCS
    • Sabelfeld, A.1    Russo, A.2
  • 32
    • 35048880192 scopus 로고    scopus 로고
    • Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203-217 (2007)
    • Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203-217 (2007)
  • 33
    • 67650202913 scopus 로고    scopus 로고
    • The Flow Caml system
    • July 2003
    • Simonet, V.: The Flow Caml system. Software release (July 2003), http://cristal.inria.fr/̃simonet/soft/flowcaml
    • Software release
    • Simonet, V.1
  • 34
    • 50249112702 scopus 로고    scopus 로고
    • Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: Proc. IEEE Symp. on Security and Privacy, May 2008, pp. 369-383 (2008)
    • Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: Proc. IEEE Symp. on Security and Privacy, May 2008, pp. 369-383 (2008)
  • 35
    • 85008603199 scopus 로고    scopus 로고
    • Provably correct runtime enforcement of non-interference properties
    • Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
    • Venkatakrishnan, V.N., Xu,W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 332-351
    • Venkatakrishnan, V.N.1    Xu, W.2    DuVarney, D.C.3    Sekar, R.4
  • 36
    • 70350430356 scopus 로고    scopus 로고
    • Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)
    • Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)
  • 37
    • 84957709924 scopus 로고    scopus 로고
    • Volpano, D.: Safety versus secrecy. In: Cortesi, A., File, G. (eds.) SAS 1999. LNCS, 1694, pp. 303-311. Springer, Heidelberg (1999)
    • Volpano, D.: Safety versus secrecy. In: Cortesi, A., File, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 303-311. Springer, Heidelberg (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.