메뉴 건너뛰기




Volumn , Issue , 2010, Pages 186-199

Dynamic vs. static flow-sensitive security analysis

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMIC INFORMATION; HYBRID MECHANISMS; INFORMATION FLOWS; NATURAL GENERALIZATION; PARAMETERIZED; REACTION METHOD; SECURITY ANALYSIS; STATIC AND DYNAMIC; STATIC FLOW; STATIC INFORMATION;

EID: 77957586261     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.20     Document Type: Conference Paper
Times cited : (164)

References (53)
  • 1
    • 57049111067 scopus 로고    scopus 로고
    • Termination-insensitive noninterference leaks more than just a bit
    • Springer-Verlag, Oct., Volume 5283 of LNCS
    • A. Askarov and S. Hunt and A. Sabelfeld and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In Proc. European Symp. on Research in Computer Security, volume 5283 of LNCS, pages 333-348. Springer-Verlag, Oct. 2008.
    • (2008) Proc. European Symp. on Research in Computer Security , pp. 333-348
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 2
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • Jan
    • G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM TOPLAS, 2(1):56-75, Jan. 1980.
    • (1980) ACM TOPLAS , vol.2 , Issue.1 , pp. 56-75
    • Andrews, G.R.1    Reitman, R.P.2
  • 3
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • Springer-Verlag, Sept., Volume 3679 of LNCS
    • A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proc. European Symp. on Research in Computer Security, volume 3679 of LNCS, pages 197-221. Springer-Verlag, Sept. 2005.
    • (2005) Proc. European Symp. on Research in Computer Security , pp. 197-221
    • Askarov, A.1    Sabelfeld, A.2
  • 11
    • 19544375598 scopus 로고    scopus 로고
    • Enforcing security and safety models with an information flow analysis tool
    • R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
    • (2004) ACM SIGAda Ada Letters , vol.24 , Issue.4 , pp. 39-46
    • Chapman, R.1    Hilton, A.2
  • 13
    • 84877700103 scopus 로고    scopus 로고
    • Sif: Enforcing confidentiality and integrity in web applications
    • Aug.
    • S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security Symposium, pages 1-16, Aug. 2007.
    • (2007) Proc. USENIX Security Symposium , pp. 1-16
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 16
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 18
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504- 513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 20
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
    • (1974) Computing J. , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 22
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • K. W. Hamlen, G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. ACM TOPLAS, 28(1):175-205, 2006.
    • (2006) ACM TOPLAS , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 26
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10), 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10
    • Lampson, B.W.1
  • 27
    • 35048820041 scopus 로고    scopus 로고
    • Automaton-based confidentiality monitoring of concurrent programs
    • July
    • G. Le Guernic. Automaton-based confidentiality monitoring of concurrent programs. In Proc. IEEE Computer Security Foundations Symposium, pages 218-232, July 2007.
    • (2007) Proc. IEEE Computer Security Foundations Symposium , pp. 218-232
    • Le Guernic, G.1
  • 32
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • Jan.
    • J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, Jan. 1990.
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 33
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • May
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symp. on Security and Privacy, pages 79-93, May 1994.
    • (1994) Proc. IEEE Symp. on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 34
    • 0012781083 scopus 로고
    • Information flow control in a distributed object-oriented system with statically-bound object variables
    • M. Mizuno and A. Oldehoeft. Information flow control in a distributed object-oriented system with statically-bound object variables. In Proc. National Computer Security Conference, pages 56-67, 1987.
    • (1987) Proc. National Computer Security Conference , pp. 56-67
    • Mizuno, M.1    Oldehoeft, A.2
  • 36
    • 70149084051 scopus 로고    scopus 로고
    • PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September
    • U. Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
    • (2007) Towards a Practical Programming Language Based on Dependent Type Theory
    • Norell, U.1
  • 37
    • 1442284555 scopus 로고
    • Can you trust your data?
    • Springer-Verlag, May, Volume 915 of LNCS
    • P. Ørbæk. Can you trust your data? In Proc. TAPSOFT/FASE'95, volume 915 of LNCS, pages 575-590. Springer-Verlag, May 1995.
    • (1995) Proc. TAPSOFT/FASE'95 , pp. 575-590
    • Ørbæk, P.1
  • 46
    • 33646091639 scopus 로고    scopus 로고
    • Software release. Located at, July
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/-simonet/soft/flowcaml July 2003.
    • (2003) The Flow Caml System
    • Simonet, V.1
  • 47
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • Springer-Verlag, Sept., Volume 3672 of LNCS
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In Proc. Symp. on Static Analysis, volume 3672 of LNCS, pages 352-367. Springer-Verlag, Sept. 2005.
    • (2005) Proc. Symp. on Static Analysis , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 50
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy
    • Springer-Verlag, Sept., Volume 1694 of LNCS
    • D. Volpano. Safety versus secrecy. In Proc. Symp. on Static Analysis, volume 1694 of LNCS, pages 303-311. Springer-Verlag, Sept. 1999.
    • (1999) Proc. Symp. on Static Analysis , pp. 303-311
    • Volpano, D.1
  • 52
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine., C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.