-
1
-
-
33845414042
-
Labels and event processes in the Asbestos operating system. SIGOPS
-
Efstathopoulos, P., Krohn, M., VanDeBogart, S., Frey, C., Ziegler, D., Kohler, E., Mazières, D., Kaashoek, F., Morris, R.: Labels and event processes in the Asbestos operating system. SIGOPS Oper. Syst. Rev. 39(5), 17-30 (2005)
-
(2005)
Oper. Syst. Rev
, vol.39
, Issue.5
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
2
-
-
84888352157
-
-
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making information flow explicit in HiStar. In: OSDI (2006)
-
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making information flow explicit in HiStar. In: OSDI (2006)
-
-
-
-
3
-
-
57749192483
-
-
Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard os abstractions. In: SOSP (2007)
-
Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard os abstractions. In: SOSP (2007)
-
-
-
-
4
-
-
77954397557
-
Analysis of the Windows Vista Security Model
-
Technical report, Symantec Corporation
-
Conover, M.: Analysis of the Windows Vista Security Model. Technical report, Symantec Corporation (2008)
-
(2008)
-
-
Conover, M.1
-
5
-
-
4444251518
-
-
Chaki, S., Clarke, E., Groce, A., Ouaknine, J., Strichman, O., Yorav, K.: Efficient verification of sequential and concurrent C programs. Form. Methods Syst. Des. 25(2-3), 129-166 (2004)
-
Chaki, S., Clarke, E., Groce, A., Ouaknine, J., Strichman, O., Yorav, K.: Efficient verification of sequential and concurrent C programs. Form. Methods Syst. Des. 25(2-3), 129-166 (2004)
-
-
-
-
6
-
-
58449099374
-
Finding concurrency-related bugs using random isolation
-
Jones, N.D, Müller-Olm, M, eds, VMCAI 2009, Springer, Heidelberg
-
Kidd, N.A., Reps, T.W., Dolby, J., Vaziri, M.: Finding concurrency-related bugs using random isolation. In: Jones, N.D., Müller-Olm, M. (eds.) VMCAI 2009. LNCS, vol. 5403, pp. 198-213. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5403
, pp. 198-213
-
-
Kidd, N.A.1
Reps, T.W.2
Dolby, J.3
Vaziri, M.4
-
7
-
-
85081524912
-
-
Apache: Apache, http://www.apache.org
-
Apache
-
-
-
8
-
-
85081501976
-
-
ClamAV
-
ClamAV: ClamAV, http://www.clamav.net
-
ClamAV
-
-
-
9
-
-
85081523051
-
-
OpenVPN
-
OpenVPN: OpenVPN, http://www.openvpn.net
-
OpenVPN
-
-
-
10
-
-
70349289357
-
-
CCS 2008
-
Chaudhuri, A., Naldurg, P., Rajamani, S.K., Ramalingam, G., Velaga, L.: EON: Modeling and analyzing dynamic access control systems with logic programs. In: CCS (2008)
-
EON: Modeling and analyzing dynamic access control systems with logic programs
-
-
Chaudhuri, A.1
Naldurg, P.2
Rajamani, S.K.3
Ramalingam, G.4
Velaga, L.5
-
12
-
-
0039488517
-
Parametric shape analysis via 3-valued logic
-
Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst. 24(3), 217-298 (2002)
-
(2002)
ACM Trans. Program. Lang. Syst
, vol.24
, Issue.3
, pp. 217-298
-
-
Sagiv, M.1
Reps, T.2
Wilhelm, R.3
-
13
-
-
85081527261
-
-
Harris, W.R., Kidd, N.A., Chaki, S., Jha, S., Reps, T.: Verifying information flow control over unbounded processes. Technical Report UW-CS-TR-1655, Univ. of Wisc (May 2009)
-
Harris, W.R., Kidd, N.A., Chaki, S., Jha, S., Reps, T.: Verifying information flow control over unbounded processes. Technical Report UW-CS-TR-1655, Univ. of Wisc (May 2009)
-
-
-
-
14
-
-
84959039613
-
-
Necula, G., McPeak, S., Rahul, S., Weimer, W.: CIL: Intermediate language and tools for analysis and transformation of C programs (2002)
-
(2002)
CIL: Intermediate language and tools for analysis and transformation of C programs
-
-
Necula, G.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
15
-
-
47149088050
-
-
December
-
MoinMoin: The MoinMoin wiki engine (December 2006), http://moinmoin. wikiwikiweb.de
-
(2006)
The MoinMoin wiki engine
-
-
-
16
-
-
37049002830
-
Labels and Event Processes in the Asbestos Operating System
-
Vandebogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Mazières, D.: Labels and Event Processes in the Asbestos Operating System. ACM Trans. Comput. Syst. 25(4), 11 (2007)
-
(2007)
ACM Trans. Comput. Syst
, vol.25
, Issue.4
, pp. 11
-
-
Vandebogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
17
-
-
0035040403
-
-
Yahav, E.: Verifying safety properties of concurrent java programs using 3-valued logic. In: POPL (2001)
-
Yahav, E.: Verifying safety properties of concurrent java programs using 3-valued logic. In: POPL (2001)
-
-
-
-
18
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
19
-
-
0032646625
-
-
Myers, A.C.: JFlow: practical mostly-static information flow control. In: POPL (1999)
-
Myers, A.C.: JFlow: practical mostly-static information flow control. In: POPL (1999)
-
-
-
-
20
-
-
11944266314
-
-
Journal of Computer Security
-
Guttman, J.D., Herzog, A.L., Ramsdell, J.D., Skorupka, C.W.: Verifying Information-Flow Goals in Security-Enhanced Linux. Journal of Computer Security (2005)
-
(2005)
Verifying Information-Flow Goals in Security-Enhanced Linux
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
21
-
-
85084161756
-
Using CQUAL for static analysis of authorization hook placement
-
Zhang, X., Edwards, A., Jaeger, T.: Using CQUAL for static analysis of authorization hook placement. In: USENIX Security Symposium, pp. 33-48 (2002)
-
(2002)
USENIX Security Symposium
, pp. 33-48
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|