-
1
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Berlin, Heidelberg, Springer-Verlag
-
A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security, pages 333-348, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
2
-
-
70450255251
-
Catch me if you can: Permissive yet secure error handling
-
New York, NY, USA, ACM
-
A. Askarov and A. Sabelfeld. Catch me if you can: permissive yet secure error handling. In PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, pages 45-57, New York, NY, USA, 2009. ACM.
-
(2009)
PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
, pp. 45-57
-
-
Askarov, A.1
Sabelfeld, A.2
-
3
-
-
70350542799
-
Tight enforcement of information-release policies for dynamic languages
-
Washington, DC, USA, IEEE Computer Society
-
A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. In IEEE Computer Security Foundations Symposium, pages 43-59, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
IEEE Computer Security Foundations Symposium
, pp. 43-59
-
-
Askarov, A.1
Sabelfeld, A.2
-
4
-
-
70450239729
-
Efficient purely-dynamic information flow analysis
-
New York, NY, USA, ACM
-
T. H. Austin and C. Flanagan. Efficient purely-dynamic information flow analysis. In PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, pages 113-124, New York, NY, USA, 2009. ACM.
-
(2009)
PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
, pp. 113-124
-
-
Austin, T.H.1
Flanagan, C.2
-
6
-
-
84948752619
-
Secure information flow and pointer confinement in a java-like language
-
IEEE Computer Society
-
A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a java-like language. In IEEE Computer Security Foundations Workshop, pages 253-267. IEEE Computer Society, 2002.
-
(2002)
IEEE Computer Security Foundations Workshop
, pp. 253-267
-
-
Banerjee, A.1
Naumann, D.A.2
-
7
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a java virtual machine
-
IEEE Computer Society
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In ACSAC, pages 463-475. IEEE Computer Society, 2007.
-
(2007)
ACSAC
, pp. 463-475
-
-
Chandra, D.1
Franz, M.2
-
8
-
-
57349156632
-
A type system for data-flow integrity on windows vista
-
Ú. Erlingsson and M. Pistoia, editors, ACM
-
A. Chaudhuri, P. Naldurg, and S. K. Rajamani. A type system for data-flow integrity on windows vista. In Ú. Erlingsson and M. Pistoia, editors, PLAS, pages 89-100. ACM, 2008.
-
(2008)
PLAS
, pp. 89-100
-
-
Chaudhuri, A.1
Naldurg, P.2
Rajamani, S.K.3
-
9
-
-
14844300105
-
Security policies for downgrading
-
New York, NY, USA, ACM
-
S. Chong and A. C. Myers. Security policies for downgrading. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 198-209, New York, NY, USA, 2004. ACM.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 198-209
-
-
Chong, S.1
Myers, A.C.2
-
11
-
-
70450253203
-
Staged information flow for javascript
-
New York, NY, USA, ACM
-
R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged information flow for javascript. In PLDI '09: Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, pages 50-62, New York, NY, USA, 2009. ACM.
-
(2009)
PLDI '09: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
15
-
-
77954895650
-
-
accessed January 2010
-
Developer's wiki: FBJS. http://wiki.developers.facebook.com/index.php/ FBJS, accessed January 2010.
-
Developer's Wiki: FBJS
-
-
-
16
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In Symposium on Principles of Programming Languages, pages 323-335, 2008.
-
(2008)
Symposium on Principles of Programming Languages
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
17
-
-
70450253198
-
Trace-based just-in-time type specialization for dynamic languages
-
A. Gal, B. Eich, M. Shaver, D. Anderson, B. Kaplan, G. Hoare, D. Mandelin, B. Zbarsky, J. Orendorff, M. Bebenita, M. Chang, M. Franz, E. Smith, R. Reitmaier, and M. Haghighat. Trace-based just-in-time type specialization for dynamic languages. In Conference on Programming Language Design and Implementation, 2009.
-
(2009)
Conference on Programming Language Design and Implementation
-
-
Gal, A.1
Eich, B.2
Shaver, M.3
Anderson, D.4
Kaplan, B.5
Hoare, G.6
Mandelin, D.7
Zbarsky, B.8
Orendorff, J.9
Bebenita, M.10
Chang, M.11
Franz, M.12
Smith, E.13
Reitmaier, R.14
Haghighat, M.15
-
18
-
-
77954893693
-
-
accessed December 2009
-
Caja. http://code.google.com/p/google-caja/, accessed December 2009.
-
Caja
-
-
-
19
-
-
70350572805
-
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
-
C. Hammer and G. Snelting. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security, 2009.
-
(2009)
International Journal of Information Security
-
-
Hammer, C.1
Snelting, G.2
-
21
-
-
33745847182
-
On flow-sensitive security types
-
J. G. Morrisett and S. L. P. Jones, editors, ACM
-
S. Hunt and D. Sands. On flow-sensitive security types. In J. G. Morrisett and S. L. P. Jones, editors, POPL, pages 79-90. ACM, 2006.
-
(2006)
POPL
, pp. 79-90
-
-
Hunt, S.1
Sands, D.2
-
22
-
-
77954888841
-
-
homepage, accessed October 2009
-
Jif homepage. http://www.cs.cornell.edu/jif/accessed October 2009.
-
Jif
-
-
-
23
-
-
58449135488
-
Implicit flows: Can't live with 'em, can't live without 'em
-
D. King, B. Hicks, M. Hicks, and T. Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In International Conference on Information Systems Security, pages 56-70, 2008.
-
(2008)
International Conference on Information Systems Security
, pp. 56-70
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
24
-
-
49949102660
-
Automata-based confidentiality monitoring
-
M. Okada and I. Satoh, editors, volume 4435 of Lecture Notes in Computer Science, Springer
-
G. Le Guernic, A. Banerjee, T. P. Jensen, and D. A. Schmidt. Automata-based confidentiality monitoring. In M. Okada and I. Satoh, editors, ASIAN, volume 4435 of Lecture Notes in Computer Science, pages 75-89. Springer, 2006.
-
(2006)
ASIAN
, pp. 75-89
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.P.3
Schmidt, D.A.4
-
25
-
-
70450245243
-
Merlin: Specification inference for explicit information flow problems
-
M. Hind and A. Diwan, editors, ACM
-
V. B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee. Merlin: specification inference for explicit information flow problems. In M. Hind and A. Diwan, editors, PLDI, pages 75-86. ACM, 2009.
-
(2009)
PLDI
, pp. 75-86
-
-
Livshits, V.B.1
Nori, A.V.2
Rajamani, S.K.3
Banerjee, A.4
-
27
-
-
77954926396
-
-
accessed December 2009
-
Internet explorer security zones. http://technet.microsoft.com/en-us/ library/dd361896.aspx, accessed December 2009.
-
Internet Explorer Security Zones
-
-
-
28
-
-
80054970454
-
-
accessed January 2009
-
JavaScript security in Mozilla. http://www.mozilla.org/projects/security/ components/jssec.html, accessed January 2009.
-
JavaScript Security in Mozilla
-
-
-
29
-
-
79952338164
-
-
accessed January 2010
-
Same origin policy for JavaScript. https://developer.mozilla.org/En/Same- origin-policy-for-JavaScript, accessed January 2010.
-
Same Origin Policy for JavaScript
-
-
-
34
-
-
70350355123
-
Tracking information flow in dynamic tree structures
-
M. Backes and P. Ning, editors, volume 5789 of Lecture Notes in Computer Science, Springer
-
A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures. In M. Backes and P. Ning, editors, ESORICS, volume 5789 of Lecture Notes in Computer Science, pages 86-103. Springer, 2009.
-
(2009)
ESORICS
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
36
-
-
84860313876
-
From dynamic to static and back: Riding the roller coaster of information-flow control research
-
A. Sabelfeld and A. Russo. From dynamic to static and back: Riding the roller coaster of information-flow control research. In Perspectives of System Informatics, 2009.
-
(2009)
Perspectives of System Informatics
-
-
Sabelfeld, A.1
Russo, A.2
-
37
-
-
70549111642
-
A language for information flow: Dynamic tracking in multiple interdependent dimensions
-
S. Chong and D. A. Naumann, editors, ACM
-
A. Shinnar, M. Pistoia, and A. Banerjee. A language for information flow: dynamic tracking in multiple interdependent dimensions. In S. Chong and D. A. Naumann, editors, PLAS, pages 125-131. ACM, 2009.
-
(2009)
PLAS
, pp. 125-131
-
-
Shinnar, A.1
Pistoia, M.2
Banerjee, A.3
-
38
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
IEEE Computer Society
-
P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. In CSF, pages 203-217. IEEE Computer Society, 2007.
-
(2007)
CSF
, pp. 203-217
-
-
Shroff, P.1
Smith, S.F.2
Thober, M.3
-
39
-
-
85008603199
-
Provably correct runtime enforcement of noninterference properties
-
V. N. Venkatakrishnan, W. Xu, D. C. DuVarney, and R. Sekar. Provably correct runtime enforcement of noninterference properties. In Information and Communications Security, pages 332-351, 2006.
-
(2006)
Information and Communications Security
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
Duvarney, D.C.3
Sekar, R.4
-
40
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
The Internet Society
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS. The Internet Society, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
41
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
42
-
-
4243267417
-
-
PhD thesis, Cornell University, Ithaca, NY, USA, Chair-Myers, Andrew
-
S. A. Zdancewic. Programming languages for information security. PhD thesis, Cornell University, Ithaca, NY, USA, 2002. Chair-Myers, Andrew.
-
(2002)
Programming Languages for Information Security
-
-
Zdancewic, S.A.1
|