-
1
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
-
Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333-348. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
2
-
-
70350542799
-
-
Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
-
Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
-
-
-
-
3
-
-
70450239729
-
-
Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)
-
Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)
-
-
-
-
4
-
-
67650663465
-
-
Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, 5491, pp. 20-34. Springer, Heidelberg (2009)
-
Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20-34. Springer, Heidelberg (2009)
-
-
-
-
5
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
-
Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
6
-
-
48649085342
-
-
Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: Proc. Annual Computer Security Applications Conference, December 2007, pp. 463-475 (2007)
-
Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: Proc. Annual Computer Security Applications Conference, December 2007, pp. 463-475 (2007)
-
-
-
-
7
-
-
41149124878
-
-
Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, October 2007, pp. 31-44 (2007)
-
Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, October 2007, pp. 31-44 (2007)
-
-
-
-
8
-
-
84877700103
-
Sif: Enforcing confidentiality and integrity in web applications
-
Chong, S., Vikram, K., Myers, A.C.: Sif: Enforcing confidentiality and integrity in web applications. In: Proc. USENIX Security Symposium, August 2007, pp. 1-16 (2007)
-
(2007)
Proc. USENIX Security Symposium, August 2007
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
9
-
-
84869638647
-
Links web-programming language
-
Cooper, E., Lindley, S., Wadler, P., Yallop, J.: Links web-programming language. Software release (2006-2008), http://groups.inf.ed.ac.uk/links/
-
(2006)
Software release
-
-
Cooper, E.1
Lindley, S.2
Wadler, P.3
Yallop, J.4
-
10
-
-
70350430365
-
-
Crockford, D.: Making javascript safe for advertising. adsafe.org (2009)
-
Crockford, D.: Making javascript safe for advertising. adsafe.org (2009)
-
-
-
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84869644897
-
-
Facebook. FBJS (2009), http://wiki.developers.facebook.com/index.php/FBJS
-
(2009)
-
-
-
13
-
-
0016382977
-
Memoryless subsystems
-
Fenton, J.S.: Memoryless subsystems. Computing J. 17(2), 143-147 (1974)
-
(1974)
Computing J
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
14
-
-
70350381463
-
-
Google. Google Chrome (2009), http://www.google.com/chrome/
-
(2009)
Google Chrome
-
-
-
15
-
-
70350405279
-
-
Google. Google Web Toolkit (2009), http://code.google.com/webtoolkit
-
(2009)
Google Web Toolkit
-
-
-
16
-
-
0031701347
-
-
Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 365-377 (1998)
-
Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 365-377 (1998)
-
-
-
-
17
-
-
19944365247
-
-
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40-52 (2004)
-
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40-52 (2004)
-
-
-
-
18
-
-
48349136934
-
On JavaScript malware and related threats
-
Johns, M.: On JavaScript malware and related threats. Journal in Computer Virology 4(3), 161-178 (2008)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 161-178
-
-
Johns, M.1
-
19
-
-
58549099340
-
-
APLAS, pp
-
Kikuchi, H., Yu, D., Chander, A., Inamura, H., Serikov, I.: Javascript instrumentation in practice. In: APLAS, pp. 326-341 (2008)
-
(2008)
Javascript instrumentation in practice
, pp. 326-341
-
-
Kikuchi, H.1
Yu, D.2
Chander, A.3
Inamura, H.4
Serikov, I.5
-
21
-
-
49949102660
-
-
Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 75-89. Springer, Heidelberg (2008)
-
Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 75-89. Springer, Heidelberg (2008)
-
-
-
-
23
-
-
70349127409
-
-
Miller, M., Samuel, M., Laurie, B., Awad, I., Stay, M.: Caja: Safe active content in sanitized javascript (2008)
-
(2008)
Caja: Safe active content in sanitized javascript
-
-
Miller, M.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
24
-
-
12844283698
-
Jif: Java information flow
-
July 2001-2009
-
Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow. Software release (July 2001-2009), http://www.cs.cornell.edu/ jif
-
Software release
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
25
-
-
70350381473
-
-
Netscape. Using data tainting for security (2006), http://wp.netscape. com/eng/mozilla/3.0/handbook/javascript/advtopic.htm
-
(2006)
Using data tainting for security
-
-
-
27
-
-
63149101516
-
A library for light-weight information-flow security in Haskell
-
ACM Press, New York
-
Russo, A., Claessen, K., Hughes, J.: A library for light-weight information-flow security in Haskell. In: Proc. ACM SIGPLAN Symposium on Haskell, pp. 13-24. ACM Press, New York (2008)
-
(2008)
Proc. ACM SIGPLAN Symposium on Haskell
, pp. 13-24
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
28
-
-
70350521681
-
-
Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
-
Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)
-
-
-
-
31
-
-
84860313876
-
From dynamic to static and back: Riding the roller coaster of information-flow control research
-
PSI, Springer, Heidelberg to appear
-
Sabelfeld, A., Russo, A.: From dynamic to static and back: Riding the roller coaster of information-flow control research. In: PSI 2009. LNCS. Springer, Heidelberg (to appear)
-
(2009)
LNCS
-
-
Sabelfeld, A.1
Russo, A.2
-
32
-
-
35048880192
-
-
Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203-217 (2007)
-
Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203-217 (2007)
-
-
-
-
33
-
-
67650202913
-
The Flow Caml system
-
July 2003
-
Simonet, V.: The Flow Caml system. Software release (July 2003), http://cristal.inria.fr/̃simonet/soft/flowcaml
-
Software release
-
-
Simonet, V.1
-
34
-
-
50249112702
-
-
Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: Proc. IEEE Symp. on Security and Privacy, May 2008, pp. 369-383 (2008)
-
Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: Proc. IEEE Symp. on Security and Privacy, May 2008, pp. 369-383 (2008)
-
-
-
-
35
-
-
85008603199
-
Provably correct runtime enforcement of non-interference properties
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Venkatakrishnan, V.N., Xu,W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
DuVarney, D.C.3
Sekar, R.4
-
36
-
-
70350430356
-
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)
-
-
-
-
37
-
-
84957709924
-
-
Volpano, D.: Safety versus secrecy. In: Cortesi, A., File, G. (eds.) SAS 1999. LNCS, 1694, pp. 303-311. Springer, Heidelberg (1999)
-
Volpano, D.: Safety versus secrecy. In: Cortesi, A., File, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 303-311. Springer, Heidelberg (1999)
-
-
-
-
39
-
-
33846497980
-
JavaScript instrumentation for browser security
-
ACM Press, New York
-
Yu, D., Chander, A., Islam, N., Serikov, I.: JavaScript instrumentation for browser security. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 237-249. ACM Press, New York (2007)
-
(2007)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|