-
1
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," Journal of computer security, vol. 4, no. 2/3, pp. 167-188, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
2
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
N. Heintze and J. G. Riecke, "The SLam calculus: programming with secrecy and integrity," in POPL, 1998, pp. 365-377.
-
(1998)
POPL
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
3
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. C. Myers, "JFlow: Practical mostly-static information flow control," in POPL, 1999, pp. 228-241.
-
(1999)
POPL
, pp. 228-241
-
-
Myers, A.C.1
-
4
-
-
84958749689
-
Security typings by abstract interpretation
-
M. Zanotti, "Security typings by abstract interpretation," in Proc. Symposium on Static Analysis, 2002, pp. 360-375.
-
(2002)
Proc. Symposium on Static Analysis
, pp. 360-375
-
-
Zanotti, M.1
-
5
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning, "Certification of programs for secure information flow," Comm. of the ACM, vol. 20, no. 7, pp. 504-513, 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
6
-
-
49949102660
-
Automata-based confidentiality monitoring
-
G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt, "Automata-based confidentiality monitoring," in ASIAN, 2006, pp. 75-89.
-
(2006)
ASIAN
, pp. 75-89
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
7
-
-
70350355123
-
Tracking information flow in dynamic tree structures
-
A. Russo, A. Sabelfeld, and A. Chudnov, "Tracking information flow in dynamic tree structures," in ESORICS, 2009, pp. 86-103.
-
(2009)
ESORICS
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
8
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August, "RIFLE: An architectural framework for user-centric information-flow security," in MICRO, 2004, pp. 243-254.
-
(2004)
MICRO
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
9
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Information and System Security, vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
10
-
-
77955192363
-
-
Online
-
"Mozilla spidermonkey website." [Online], Available: http://www.mozilla.org/js/spidermonkey/
-
Mozilla Spidermonkey Website
-
-
-
12
-
-
48349136934
-
On JavaScript malware and related threats
-
M. Johns, "On JavaScript malware and related threats," Journal in Computer Virology, vol. 4, no. 3, pp. 161-178, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 161-178
-
-
Johns, M.1
-
13
-
-
70450253203
-
Staged information flow for javascript
-
R. Chugh, J. A. Meister, R. Jhala, and S. Lerner, "Staged information flow for javascript," in PLDI, 2009, pp. 50-62.
-
(2009)
PLDI
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
14
-
-
70350371746
-
Isolating javascript with filters, rewriting, and wrappers
-
S. Maffeis, J. C. Mitchell, and A. Taly, "Isolating javascript with filters, rewriting, and wrappers," in ESORICS, 2009, pp. 505-522.
-
(2009)
ESORICS
, pp. 505-522
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
15
-
-
49949108946
-
Closing internal timing channels by transformation
-
A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld, "Closing internal timing channels by transformation," in ASIAN, 2006, pp. 120-135.
-
(2006)
ASIAN
, pp. 120-135
-
-
Russo, A.1
Hughes, J.2
Naumann, D.3
Sabelfeld, A.4
-
18
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip, "A survey of program slicing techniques," Journal of programming languages, vol. 3, no. 3, pp. 121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
20
-
-
0037251378
-
Language-based information-flow security
-
A. Sabelfeld and A. Myers, "Language-based information-flow security," IEEE Journal on selected areas in communications, vol. 21, no. 1, pp. 5-19, 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
21
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
G. Smith and D. Volpano, "Secure information flow in a multi-threaded imperative language," in POPL, 1998, pp. 355-364.
-
(1998)
POPL
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
23
-
-
0348017041
-
Information flow inference for ML
-
F. Pottier and V. Simonet, "Information flow inference for ML," ACM Trans. Program. Lang. Syst., vol. 25, no. 1, pp. 117-158, 2003.
-
(2003)
ACM Trans. Program. Lang. Syst.
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
24
-
-
4944265699
-
Secure information flow by self-composition
-
G. Barthe, P. R. D'Argenio, and T. Rezk, "Secure information flow by self-composition," in CSFW, 2004, pp. 100-114.
-
(2004)
CSFW
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.R.2
Rezk, T.3
-
25
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna, "Cross site scripting prevention with dynamic data tainting and static analysis," in NDSS, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
26
-
-
84991934426
-
TightLip: Keeping applications from spilling the beans
-
A. R. Yumerefendi, B. Mickle, and L. P. Cox, "TightLip: Keeping applications from spilling the beans," in NSDI, 2007.
-
(2007)
NSDI
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
|