메뉴 건너뛰기




Volumn , Issue , 2009, Pages 50-62

Staged information flow for JavaScript

Author keywords

Confidentiality; Flow analysis; Integrity; Set constraints; Web applications

Indexed keywords

FLEXIBLE DYNAMICS; FLOW ANALYSIS; INFORMATION FLOWS; JAVASCRIPT; REAL-WORLD; RUNTIMES; SCRIPTING LANGUAGES; SECURITY PROPERTIES; SENSITIVE INFORMATIONS; SET CONSTRAINTS; STATIC INFORMATION; SYSTEM'S PERFORMANCE; WEB APPLICATION;

EID: 70450253203     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542476.1542483     Document Type: Conference Paper
Times cited : (130)

References (37)
  • 1
    • 70450228344 scopus 로고    scopus 로고
    • sites, November
    • English: Alexa top 100 sites, November 2008. http://www.alexa.com/.
    • (2008) Alexa top , vol.100
    • English1
  • 2
    • 84871644299 scopus 로고    scopus 로고
    • November 2008
    • Google web toolkit, November 2008. http://code.google.com/webtoolkit/.
    • Google web toolkit
  • 3
    • 70450279778 scopus 로고    scopus 로고
    • November
    • Jsure, November 2008. http://www.jsure.org/.
    • (2008)
  • 4
    • 70450264378 scopus 로고    scopus 로고
    • November
    • Volta, November 2008. http://live.labs.com/volta.
    • (2008)
    • Volta1
  • 5
    • 35048839749 scopus 로고    scopus 로고
    • T. Amtoft and A. Banerjee. Information flow analysis in logical form. In SAS, pages 100-115, 2004.
    • T. Amtoft and A. Banerjee. Information flow analysis in logical form. In SAS, pages 100-115, 2004.
  • 6
    • 26444544471 scopus 로고    scopus 로고
    • Towards type inference for javascript
    • C. Anderson, P. Giannini, and S. Drossopoulou. Towards type inference for javascript. In ECOOP, pages 428-452, 2005.
    • (2005) ECOOP , pp. 428-452
    • Anderson, C.1    Giannini, P.2    Drossopoulou, S.3
  • 10
    • 85017248930 scopus 로고    scopus 로고
    • Program analysis using mixed term and set constraints
    • M. Fähndrich and A. Aiken. Program analysis using mixed term and set constraints. In SAS, pages 114-126, 1997.
    • (1997) SAS , pp. 114-126
    • Fähndrich, M.1    Aiken, A.2
  • 11
    • 4243972567 scopus 로고    scopus 로고
    • Tracking down exceptions in standard ml programs
    • Technical report, EECS Department, UC Berkeley
    • M. Fähndrich, J. S. Foster, A. Aiken, and J. Cu. Tracking down exceptions in standard ml programs. Technical report, EECS Department, UC Berkeley, 1998.
    • (1998)
    • Fähndrich, M.1    Foster, J.S.2    Aiken, A.3    Cu, J.4
  • 14
    • 70450274179 scopus 로고    scopus 로고
    • J. S. Foster, M. Fähndrich, and A. Aiken. Polymorphic versus monomorphic flow-insensitive points-to analysis for c. In SAS, 2000.
    • J. S. Foster, M. Fähndrich, and A. Aiken. Polymorphic versus monomorphic flow-insensitive points-to analysis for c. In SAS, 2000.
  • 16
    • 35448946037 scopus 로고    scopus 로고
    • The ant and the grasshopper: Fast and accurate pointer analysis for millions of lines of code
    • B. Hardekopf and C. Lin. The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. In PLDI, 2007.
    • (2007) PLDI
    • Hardekopf, B.1    Lin, C.2
  • 17
    • 38849182183 scopus 로고    scopus 로고
    • Status report: Specifying javascript with ml
    • D. Herman and C. Flanagan. Status report: specifying javascript with ml. In ML, pages 47-52, 2007.
    • (2007) ML , pp. 47-52
    • Herman, D.1    Flanagan, C.2
  • 18
    • 35348860223 scopus 로고    scopus 로고
    • T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In WWW, 2007.
    • T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In WWW, 2007.
  • 19
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • N. Jovanovic, C. Krügel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy, 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Jovanovic, N.1    Krügel, C.2    Kirda, E.3
  • 20
    • 33646044421 scopus 로고    scopus 로고
    • J. Kodumal and A. Aiken. Banshee: A scalable constraint-based analysis toolkit. In SAS, pages 218-234, 2005.
    • J. Kodumal and A. Aiken. Banshee: A scalable constraint-based analysis toolkit. In SAS, pages 218-234, 2005.
  • 21
    • 77950880816 scopus 로고    scopus 로고
    • Securing web applications with static and dynamic information flow tracking
    • M. S. Lam, M. Martin, V. B. Livshits, and J. Whaley. Securing web applications with static and dynamic information flow tracking. In PEPM, pages 3-12, 2008.
    • (2008) PEPM , pp. 3-12
    • Lam, M.S.1    Martin, M.2    Livshits, V.B.3    Whaley, J.4
  • 22
    • 67650832221 scopus 로고    scopus 로고
    • Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
    • Technical Report MSR-TR-2009-16, Microsoft Research, Feb
    • B. Livshits and S. Guarnieri. Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code. Technical Report MSR-TR-2009-16, Microsoft Research, Feb. 2009.
    • (2009)
    • Livshits, B.1    Guarnieri, S.2
  • 23
    • 24644460258 scopus 로고    scopus 로고
    • Programming with explicit security policies
    • A. C. Myers. Programming with explicit security policies. In ESOP, pages 1-4, 2005.
    • (2005) ESOP , pp. 1-4
    • Myers, A.C.1
  • 24
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.X.2
  • 25
    • 0036037318 scopus 로고    scopus 로고
    • Information flow inference for ml
    • F. Pottier and V. Simonet. Information flow inference for ml. In POPL, pages 319-330, 2002.
    • (2002) POPL , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 26
    • 33745201521 scopus 로고    scopus 로고
    • Locksmith: Context-sensitive correlation analysis for race detection
    • ACM
    • P. Pratikakis, J. S. Foster, and M. Hicks. Locksmith: context-sensitive correlation analysis for race detection. In PLDI. ACM, 2006.
    • (2006) PLDI
    • Pratikakis, P.1    Foster, J.S.2    Hicks, M.3
  • 29
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, 2004.
    • (2004) ASPLOS
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 30
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, pages 352-367, 2005.
    • (2005) SAS , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 31
    • 24644446108 scopus 로고    scopus 로고
    • Towards a type system for analyzing javascript programs
    • P. Thiemann. Towards a type system for analyzing javascript programs. In ESOP, pages 408-422, 2005.
    • (2005) ESOP , pp. 408-422
    • Thiemann, P.1
  • 32
    • 21644475650 scopus 로고    scopus 로고
    • N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO, 2004.
    • N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO, 2004.
  • 33
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • D. Volpano and G. Smith. Verifying secrets and relative secrecy. In POPL, 2000.
    • (2000) POPL
    • Volpano, D.1    Smith, G.2
  • 34
    • 57349153984 scopus 로고    scopus 로고
    • Static detection of cross-site scripting vulnerabilities
    • G. Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE, pages 171-180, 2008.
    • (2008) ICSE , pp. 171-180
    • Wassermann, G.1    Su, Z.2
  • 35
    • 17044371129 scopus 로고    scopus 로고
    • Scalable error detection using boolean satisfiability
    • Y. Xie and A. Aiken. Scalable error detection using boolean satisfiability. In POPL, pages 351-363, 2005.
    • (2005) POPL , pp. 351-363
    • Xie, Y.1    Aiken, A.2
  • 36
    • 33846497980 scopus 로고    scopus 로고
    • Javascript instrumentation for browser security
    • D. Yu, A. Chander, N. Islam, and I. Serikov. Javascript instrumentation for browser security. In POPL, pages 237-249, 2007.
    • (2007) POPL , pp. 237-249
    • Yu, D.1    Chander, A.2    Islam, N.3    Serikov, I.4
  • 37
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In NSDI, 2008.
    • (2008) NSDI
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazières, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.