메뉴 건너뛰기




Volumn , Issue , 2010, Pages 109-124

Noninterference through secure multi-execution

Author keywords

[No Author keywords available]

Indexed keywords

ALTERNATIVE APPROACH; BENCHMARK SUITES; COVERT CHANNELS; DOM TREE; DYNAMIC MONITORING SYSTEM; EXECUTION TIME; I/O OPERATIONS; INFORMATION FLOW ANALYSIS; JAVASCRIPT; LANGUAGE FEATURES; MULTI CORE; NON-DETERMINISM; POSSIBLE SOLUTIONS; SECURITY LEVEL; SIDE EFFECT; TYPE SYSTEMS;

EID: 77955223614     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.15     Document Type: Conference Paper
Times cited : (217)

References (27)
  • 1
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," Journal of computer security, vol. 4, no. 2/3, pp. 167-188, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-188
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 2
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • N. Heintze and J. G. Riecke, "The SLam calculus: programming with secrecy and integrity," in POPL, 1998, pp. 365-377.
    • (1998) POPL , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 3
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. C. Myers, "JFlow: Practical mostly-static information flow control," in POPL, 1999, pp. 228-241.
    • (1999) POPL , pp. 228-241
    • Myers, A.C.1
  • 4
    • 84958749689 scopus 로고    scopus 로고
    • Security typings by abstract interpretation
    • M. Zanotti, "Security typings by abstract interpretation," in Proc. Symposium on Static Analysis, 2002, pp. 360-375.
    • (2002) Proc. Symposium on Static Analysis , pp. 360-375
    • Zanotti, M.1
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning, "Certification of programs for secure information flow," Comm. of the ACM, vol. 20, no. 7, pp. 504-513, 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 7
    • 70350355123 scopus 로고    scopus 로고
    • Tracking information flow in dynamic tree structures
    • A. Russo, A. Sabelfeld, and A. Chudnov, "Tracking information flow in dynamic tree structures," in ESORICS, 2009, pp. 86-103.
    • (2009) ESORICS , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 10
  • 12
    • 48349136934 scopus 로고    scopus 로고
    • On JavaScript malware and related threats
    • M. Johns, "On JavaScript malware and related threats," Journal in Computer Virology, vol. 4, no. 3, pp. 161-178, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 161-178
    • Johns, M.1
  • 13
    • 70450253203 scopus 로고    scopus 로고
    • Staged information flow for javascript
    • R. Chugh, J. A. Meister, R. Jhala, and S. Lerner, "Staged information flow for javascript," in PLDI, 2009, pp. 50-62.
    • (2009) PLDI , pp. 50-62
    • Chugh, R.1    Meister, J.A.2    Jhala, R.3    Lerner, S.4
  • 14
    • 70350371746 scopus 로고    scopus 로고
    • Isolating javascript with filters, rewriting, and wrappers
    • S. Maffeis, J. C. Mitchell, and A. Taly, "Isolating javascript with filters, rewriting, and wrappers," in ESORICS, 2009, pp. 505-522.
    • (2009) ESORICS , pp. 505-522
    • Maffeis, S.1    Mitchell, J.C.2    Taly, A.3
  • 15
    • 49949108946 scopus 로고    scopus 로고
    • Closing internal timing channels by transformation
    • A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld, "Closing internal timing channels by transformation," in ASIAN, 2006, pp. 120-135.
    • (2006) ASIAN , pp. 120-135
    • Russo, A.1    Hughes, J.2    Naumann, D.3    Sabelfeld, A.4
  • 18
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip, "A survey of program slicing techniques," Journal of programming languages, vol. 3, no. 3, pp. 121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , Issue.3 , pp. 121-189
    • Tip, F.1
  • 21
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. Smith and D. Volpano, "Secure information flow in a multi-threaded imperative language," in POPL, 1998, pp. 355-364.
    • (1998) POPL , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 23
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • F. Pottier and V. Simonet, "Information flow inference for ML," ACM Trans. Program. Lang. Syst., vol. 25, no. 1, pp. 117-158, 2003.
    • (2003) ACM Trans. Program. Lang. Syst. , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 24
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • G. Barthe, P. R. D'Argenio, and T. Rezk, "Secure information flow by self-composition," in CSFW, 2004, pp. 100-114.
    • (2004) CSFW , pp. 100-114
    • Barthe, G.1    D'Argenio, P.R.2    Rezk, T.3
  • 25
    • 84887309913 scopus 로고    scopus 로고
    • Cross site scripting prevention with dynamic data tainting and static analysis
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna, "Cross site scripting prevention with dynamic data tainting and static analysis," in NDSS, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Krügel, C.5    Vigna, G.6
  • 26
    • 84991934426 scopus 로고    scopus 로고
    • TightLip: Keeping applications from spilling the beans
    • A. R. Yumerefendi, B. Mickle, and L. P. Cox, "TightLip: Keeping applications from spilling the beans," in NSDI, 2007.
    • (2007) NSDI
    • Yumerefendi, A.R.1    Mickle, B.2    Cox, L.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.