-
1
-
-
70449625216
-
Automatic discovery and quantification of information leaks
-
IEEE Computer Society
-
M. Backes, B. Köpf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In IEEE Symposium on Security and Privacy, pages 141-153. IEEE Computer Society, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
-
2
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
T. Ball and S. K. Rajamani. The SLAM project: debugging system software via static analysis. In POPL, pages 1-3, 2002.
-
(2002)
POPL
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
3
-
-
4944265699
-
Secure information flow by self-composition
-
IEEE Computer Society
-
G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, pages 100-114. IEEE Computer Society, 2004.
-
(2004)
CSFW
, pp. 100-114
-
-
Barthe, G.1
D'argenio, P.R.2
Rezk, T.3
-
4
-
-
35348951470
-
The software model checker Blast
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker Blast. STTT, 9(5-6):505-525, 2007.
-
(2007)
STTT
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
6
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative information flow, relations and polymorphic types. J. Log. Comput., 15(2):181-199, 2005.
-
(2005)
J. Log. Comput.
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
8
-
-
28144442041
-
Belief in information flow
-
IEEE Computer Society
-
M. R. Clarkson, A. C. Myers, and F. B. Schneider. Belief in information flow. In CSFW, pages 31-45. IEEE Computer Society, 2005.
-
(2005)
CSFW
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
9
-
-
51749086409
-
Hyperproperties
-
IEEE Computer Society
-
M. R. Clarkson and F. B. Schneider. Hyperproperties. In CSF, pages 51-65. IEEE Computer Society, 2008.
-
(2008)
CSF
, pp. 51-65
-
-
Clarkson, M.R.1
Schneider, F.B.2
-
10
-
-
84976675687
-
Information transmission in computational systems
-
E. S. Cohen. Information transmission in computational systems. In SOSP, pages 133-139, 1977.
-
(1977)
SOSP
, pp. 133-139
-
-
Cohen, E.S.1
-
11
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
D. Hutter and M. Ullmann, editors, Springer, Volume 3450 of Lecture Notes in Computer Science
-
Á . Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In D. Hutter and M. Ullmann, editors, SPC, volume 3450 of Lecture Notes in Computer Science, pages 193-209. Springer, 2005.
-
(2005)
SPC
, pp. 193-209
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
12
-
-
0004238984
-
-
Addison-Wesley Longman Publishing Co. Inc. Boston, MA, USA
-
D. E. R. Denning. Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.E.R.1
-
13
-
-
17644404426
-
Avoiding exponential explosion: Generating compact verification conditions
-
C. Flanagan and J. B. Saxe. Avoiding exponential explosion: generating compact verification conditions. In POPL, pages 193-205, 2001.
-
(2001)
POPL
, pp. 193-205
-
-
Flanagan, C.1
Saxe, J.B.2
-
15
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In POPL, pages 58-70, 2002.
-
(2002)
POPL
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
16
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM
-
B. K̈opf and D. A. Basin. An information-theoretic model for adaptive side-channel attacks. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 286-296. ACM, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 286-296
-
-
K̈opf, B.1
Basin, D.A.2
-
17
-
-
13844267476
-
Efficient weakest preconditions
-
K. R. M. Leino. Efficient weakest preconditions. Inf. Process. Lett., 93(6):281-288, 2005.
-
(2005)
Inf. Process. Lett.
, vol.93
, Issue.6
, pp. 281-288
-
-
Leino, K.R.M.1
-
18
-
-
28144461940
-
Downgrading policies and relaxed noninterference
-
editors, ACM, In J. Palsberg and M. Abadi
-
P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In J. Palsberg and M. Abadi, editors, POPL, pages 158-170. ACM, 2005.
-
(2005)
POPL
, pp. 158-170
-
-
Li, P.1
Zdancewic, S.2
-
19
-
-
34548282543
-
Assessing security threats of looping constructs
-
M. Hofmann and M. Felleisen, editors, ACM
-
P. Malacaria. Assessing security threats of looping constructs. In M. Hofmann and M. Felleisen, editors, POPL, pages 225- 235. ACM, 2007.
-
(2007)
POPL
, pp. 225-235
-
-
Malacaria, P.1
-
20
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Ú . Erlingsson and M. Pistoia, editors, ACM
-
P. Malacaria and H. Chen. Lagrange multipliers and maximum information leakage in different observational models. In Ú . Erlingsson and M. Pistoia, editors, PLAS, pages 135- 146. ACM, 2008.
-
(2008)
PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
22
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
R. Gupta and S. P. Amarasinghe, editors, ACM
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In R. Gupta and S. P. Amarasinghe, editors, PLDI, pages 193-205. ACM, 2008.
-
(2008)
PLDI
, pp. 193-205
-
-
Mccamant, S.1
Ernst, M.D.2
-
23
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
Washington, DC, USA, IEEE Computer Society
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, page 79, Washington, DC, USA, 1994. IEEE Computer Society.
-
(1994)
SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy
, pp. 79
-
-
Mclean, J.1
-
24
-
-
33749856863
-
Lazy abstraction with interpolants
-
T. Ball and R. B. Jones, editors, Springer, Volume 4144 of Lecture Notes in Computer Science
-
K. L. McMillan. Lazy abstraction with interpolants. In T. Ball and R. B. Jones, editors, CAV, volume 4144 of Lecture Notes in Computer Science, pages 123-136. Springer, 2006.
-
(2006)
CAV
, pp. 123-136
-
-
McMillan, K.L.1
-
25
-
-
33750232981
-
From coupling relations to mated invariants for checking information flow
-
Hamburg, Germany, Sept.
-
D. A. Naumann. From coupling relations to mated invariants for checking information flow. In Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Proceedings, pages 279-296, Hamburg, Germany, Sept. 2006.
-
(2006)
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Proceedings
, pp. 279-296
-
-
Naumann, D.A.1
-
26
-
-
70450252184
-
Measuring channel capacity to distinguish undue influence
-
S. Chong and D. A. Naumann, editors, ACM
-
J. Newsome, S. McCamant, and D. Song. Measuring channel capacity to distinguish undue influence. In S. Chong and D. A. Naumann, editors, PLAS, pages 73-85. ACM, 2009.
-
(2009)
PLAS
, pp. 73-85
-
-
Newsome, J.1
McCamant, S.2
Song, D.3
-
27
-
-
35048828759
-
A model for delimited information release
-
K. Futatsugi, F. Mizoguchi, and N. Yonezaki, editors, Springer, Volume 3233 of Lecture Notes in Computer Science
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In K. Futatsugi, F. Mizoguchi, and N. Yonezaki, editors, ISSS, volume 3233 of Lecture Notes in Computer Science, pages 174-191. Springer, 2003.
-
(2003)
ISSS
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
28
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379-423, 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
29
-
-
68549087948
-
On the foundations of quantitative information flow
-
L. de Alfaro, editor, Springer, Volume 5504 of Lecture Notes in Computer Science
-
G. Smith. On the foundations of quantitative information flow. In L. de Alfaro, editor, FOSSACS, volume 5504 of Lecture Notes in Computer Science, pages 288-302. Springer, 2009.
-
(2009)
FOSSACS
, pp. 288-302
-
-
Smith, G.1
-
30
-
-
33646037706
-
Secure information flow as a safety problem
-
C. Hankin and I. Siveroni, editors, Springer, Volume 3672 of Lecture Notes in Computer Science
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In C. Hankin and I. Siveroni, editors, SAS, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
-
(2005)
SAS
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
31
-
-
0026239342
-
PP is as hard as the polynomial-time hierarchy
-
S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM J. Comput., 20(5):865-877, 1991.
-
(1991)
SIAM J. Comput.
, vol.20
, Issue.5
, pp. 865-877
-
-
Toda, S.1
-
32
-
-
33745935759
-
Combining type-based analysis and model checking for finding counterexamples against non-interference
-
V. C. Sreedhar and S. Zdancewic, editors, ACM
-
H. Unno, N. Kobayashi, and A. Yonezawa. Combining type-based analysis and model checking for finding counterexamples against non-interference. In V. C. Sreedhar and S. Zdancewic, editors, PLAS, pages 17-26. ACM, 2006.
-
(2006)
PLAS
, pp. 17-26
-
-
Unno, H.1
Kobayashi, N.2
Yonezawa, A.3
-
33
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167- 187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|