메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Permissive dynamic information flow analysis

Author keywords

Dynamic analysis; Information flow control

Indexed keywords

DYNAMIC ANALYSIS TECHNIQUES; DYNAMIC INFORMATION FLOW ANALYSIS; EXECUTION PATHS; INFORMATION FLOW CONTROL; NON INTERFERENCE; PRIVATE DATA; PROGRAM SOURCE CODES;

EID: 77954893910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1814217.1814220     Document Type: Conference Paper
Times cited : (103)

References (42)
  • 3
    • 70350542799 scopus 로고    scopus 로고
    • Tight enforcement of information-release policies for dynamic languages
    • Washington, DC, USA, IEEE Computer Society
    • A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. In IEEE Computer Security Foundations Symposium, pages 43-59, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) IEEE Computer Security Foundations Symposium , pp. 43-59
    • Askarov, A.1    Sabelfeld, A.2
  • 6
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a java-like language
    • IEEE Computer Society
    • A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a java-like language. In IEEE Computer Security Foundations Workshop, pages 253-267. IEEE Computer Society, 2002.
    • (2002) IEEE Computer Security Foundations Workshop , pp. 253-267
    • Banerjee, A.1    Naumann, D.A.2
  • 7
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a java virtual machine
    • IEEE Computer Society
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In ACSAC, pages 463-475. IEEE Computer Society, 2007.
    • (2007) ACSAC , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 8
    • 57349156632 scopus 로고    scopus 로고
    • A type system for data-flow integrity on windows vista
    • Ú. Erlingsson and M. Pistoia, editors, ACM
    • A. Chaudhuri, P. Naldurg, and S. K. Rajamani. A type system for data-flow integrity on windows vista. In Ú. Erlingsson and M. Pistoia, editors, PLAS, pages 89-100. ACM, 2008.
    • (2008) PLAS , pp. 89-100
    • Chaudhuri, A.1    Naldurg, P.2    Rajamani, S.K.3
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 13
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 15
    • 77954895650 scopus 로고    scopus 로고
    • accessed January 2010
    • Developer's wiki: FBJS. http://wiki.developers.facebook.com/index.php/ FBJS, accessed January 2010.
    • Developer's Wiki: FBJS
  • 16
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In Symposium on Principles of Programming Languages, pages 323-335, 2008.
    • (2008) Symposium on Principles of Programming Languages , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 18
    • 77954893693 scopus 로고    scopus 로고
    • accessed December 2009
    • Caja. http://code.google.com/p/google-caja/, accessed December 2009.
    • Caja
  • 19
    • 70350572805 scopus 로고    scopus 로고
    • Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
    • C. Hammer and G. Snelting. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security, 2009.
    • (2009) International Journal of Information Security
    • Hammer, C.1    Snelting, G.2
  • 21
    • 33745847182 scopus 로고    scopus 로고
    • On flow-sensitive security types
    • J. G. Morrisett and S. L. P. Jones, editors, ACM
    • S. Hunt and D. Sands. On flow-sensitive security types. In J. G. Morrisett and S. L. P. Jones, editors, POPL, pages 79-90. ACM, 2006.
    • (2006) POPL , pp. 79-90
    • Hunt, S.1    Sands, D.2
  • 22
    • 77954888841 scopus 로고    scopus 로고
    • homepage, accessed October 2009
    • Jif homepage. http://www.cs.cornell.edu/jif/accessed October 2009.
    • Jif
  • 24
    • 49949102660 scopus 로고    scopus 로고
    • Automata-based confidentiality monitoring
    • M. Okada and I. Satoh, editors, volume 4435 of Lecture Notes in Computer Science, Springer
    • G. Le Guernic, A. Banerjee, T. P. Jensen, and D. A. Schmidt. Automata-based confidentiality monitoring. In M. Okada and I. Satoh, editors, ASIAN, volume 4435 of Lecture Notes in Computer Science, pages 75-89. Springer, 2006.
    • (2006) ASIAN , pp. 75-89
    • Le Guernic, G.1    Banerjee, A.2    Jensen, T.P.3    Schmidt, D.A.4
  • 25
    • 70450245243 scopus 로고    scopus 로고
    • Merlin: Specification inference for explicit information flow problems
    • M. Hind and A. Diwan, editors, ACM
    • V. B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee. Merlin: specification inference for explicit information flow problems. In M. Hind and A. Diwan, editors, PLDI, pages 75-86. ACM, 2009.
    • (2009) PLDI , pp. 75-86
    • Livshits, V.B.1    Nori, A.V.2    Rajamani, S.K.3    Banerjee, A.4
  • 27
    • 77954926396 scopus 로고    scopus 로고
    • accessed December 2009
    • Internet explorer security zones. http://technet.microsoft.com/en-us/ library/dd361896.aspx, accessed December 2009.
    • Internet Explorer Security Zones
  • 28
    • 80054970454 scopus 로고    scopus 로고
    • accessed January 2009
    • JavaScript security in Mozilla. http://www.mozilla.org/projects/security/ components/jssec.html, accessed January 2009.
    • JavaScript Security in Mozilla
  • 29
    • 79952338164 scopus 로고    scopus 로고
    • accessed January 2010
    • Same origin policy for JavaScript. https://developer.mozilla.org/En/Same- origin-policy-for-JavaScript, accessed January 2010.
    • Same Origin Policy for JavaScript
  • 34
    • 70350355123 scopus 로고    scopus 로고
    • Tracking information flow in dynamic tree structures
    • M. Backes and P. Ning, editors, volume 5789 of Lecture Notes in Computer Science, Springer
    • A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures. In M. Backes and P. Ning, editors, ESORICS, volume 5789 of Lecture Notes in Computer Science, pages 86-103. Springer, 2009.
    • (2009) ESORICS , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 36
    • 84860313876 scopus 로고    scopus 로고
    • From dynamic to static and back: Riding the roller coaster of information-flow control research
    • A. Sabelfeld and A. Russo. From dynamic to static and back: Riding the roller coaster of information-flow control research. In Perspectives of System Informatics, 2009.
    • (2009) Perspectives of System Informatics
    • Sabelfeld, A.1    Russo, A.2
  • 37
    • 70549111642 scopus 로고    scopus 로고
    • A language for information flow: Dynamic tracking in multiple interdependent dimensions
    • S. Chong and D. A. Naumann, editors, ACM
    • A. Shinnar, M. Pistoia, and A. Banerjee. A language for information flow: dynamic tracking in multiple interdependent dimensions. In S. Chong and D. A. Naumann, editors, PLAS, pages 125-131. ACM, 2009.
    • (2009) PLAS , pp. 125-131
    • Shinnar, A.1    Pistoia, M.2    Banerjee, A.3
  • 38
    • 35048880192 scopus 로고    scopus 로고
    • Dynamic dependency monitoring to secure information flow
    • IEEE Computer Society
    • P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. In CSF, pages 203-217. IEEE Computer Society, 2007.
    • (2007) CSF , pp. 203-217
    • Shroff, P.1    Smith, S.F.2    Thober, M.3
  • 40
    • 84887309913 scopus 로고    scopus 로고
    • Cross site scripting prevention with dynamic data tainting and static analysis
    • The Internet Society
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS. The Internet Society, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Krügel, C.5    Vigna, G.6
  • 41


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.