메뉴 건너뛰기




Volumn , Issue , 2010, Pages 3-14

Approximation and randomization for quantitative information-FLOW analysis

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED TECHNIQUES; PROGRAM EXECUTION; PROGRAM SECURITY; QUANTITATIVE INFORMATION; RANDOMIZATION TECHNIQUES; SAMPLING METHOD; STATIC AND DYNAMIC;

EID: 77957604761     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.8     Document Type: Conference Paper
Times cited : (69)

References (46)
  • 2
    • 45849140560 scopus 로고    scopus 로고
    • The parma polyhedra library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems
    • R. Bagnara, P. M. Hill, and E. Zaffanella. The Parma Polyhedra Library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems. Science of Computer Programming, 72(1-2), 2008.
    • (2008) Science of Computer Programming , vol.72 , Issue.1-2
    • Bagnara, R.1    Hill, P.M.2    Zaffanella, E.3
  • 7
    • 0000975439 scopus 로고
    • A polynomial time algorithm for counting integral points in polyhedra when the dimension is fixed
    • A. Barvinok. A Polynomial Time Algorithm for Counting Integral Points in Polyhedra when the Dimension is Fixed. Mathematics of Operations Research, 19:189-202, 1994.
    • (1994) Mathematics of Operations Research , vol.19 , pp. 189-202
    • Barvinok, A.1
  • 11
    • 55949090271 scopus 로고    scopus 로고
    • Theory and techniques for automatic generation of vulnerabilitybased signatures
    • D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Theory and techniques for automatic generation of vulnerabilitybased signatures. IEEE Trans. Dependable Sec. Comput., 5(4):224-241, 2008.
    • (2008) IEEE Trans. Dependable Sec. Comput. , vol.5 , Issue.4 , pp. 224-241
    • Brumley, D.1    Newsome, J.2    Song, D.3    Wang, H.4    Jha, S.5
  • 14
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18(2):181-199, 2005.
    • (2005) J. Log. Comput. , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 15
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 17
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • Academic Press
    • E. Cohen. Information Transmission in Sequential Programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.1
  • 19
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages (POPL '77), pages 238-252. ACM, 1977.
    • (1977) Proc. ACM Symp. on Principles of Programming Languages (POPL '77) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 23
    • 24144461208 scopus 로고    scopus 로고
    • Software model checking: The VeriSoft approach
    • P. Godefroid. Software model checking: The VeriSoft approach. Formal Methods in System Design, 26(2):77-101, 2005.
    • (2005) Formal Methods in System Design , vol.26 , Issue.2 , pp. 77-101
    • Godefroid, P.1
  • 25
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. W. Gray. Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security, 1(3- 4):255-294, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.3-4 , pp. 255-294
    • Gray, J.W.1
  • 28
    • 70350592315 scopus 로고    scopus 로고
    • Apron: A library of numerical abstract domains for static analysis
    • LNCS, Springer
    • B. Jeannet and A. Miné. Apron: A library of numerical abstract domains for static analysis. In Proc. Intl. Conf. on Computer Aided Verification (CAV '09), LNCS 5643, pages 661-667. Springer, 2009.
    • (2009) Proc. Intl. Conf. on Computer Aided Verification (CAV '09) , vol.5643 , pp. 661-667
    • Jeannet, B.1    Miné, A.2
  • 29
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems
    • LNCS, Springer
    • P. Kocher. Timing Attacks on Implementations of Diffie- Hellman, RSA, DSS, and Other Systems. In Proc. Annual Intl. Cryptology Conference (CRYPTO '96), LNCS 1109, pages 104-113. Springer, 1996.
    • (1996) Proc. Annual Intl. Cryptology Conference (CRYPTO '96) , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 44
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656, July and October
    • C. E. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, July and October 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.