-
1
-
-
35048839749
-
Information ow analysis in logical form
-
R. Giacobazzi, editor LNCS, Springer-Verlag, Aug.
-
T. Amtoft and A. Banerjee. Information ow analysis in logical form. In R. Giacobazzi, editor, Proceedings of SAS 2004, volume 3148 of LNCS, pages 100-15. Springer-Verlag, Aug. 2004.
-
(2004)
Proceedings of SAS 2004
, vol.3148
, pp. 100-15
-
-
Amtoft, T.1
Banerjee, A.2
-
3
-
-
78649982493
-
-
Bugzilla@Mozilla. Bug 147777 - :visited support allows queries into global history, May. Online
-
Bugzilla@Mozilla. Bug 147777 - :visited support allows queries into global history, May 2002. Online: https://bugzilla.mozilla.org/show-bug.cgi?id= 147777.
-
(2002)
-
-
-
4
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
M. Blaze, editor. USENIX, Aug, 2004
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In M. Blaze, editor, Proceedings of USENIX Security 2004, pages 321-36. USENIX, Aug.2004.
-
(2004)
Proceedings of USENIX Security
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
5
-
-
77957563684
-
Information ow monitor inlining
-
M. Backes and A. Myers, editors IEEE Computer Society, July
-
A. Chudnov and D. A. Naumann. Information ow monitor inlining. In M. Backes and A. Myers, editors, Proceedings of CSF 2010. IEEE Computer Society, July 2010.
-
(2010)
Proceedings of CSF 2010
-
-
Chudnov, A.1
Naumann, D.A.2
-
6
-
-
78649997198
-
-
Online: 5GP020A6LG.html, Feb.
-
A. Clover. Timing attacks on Web privacy. Online: 5GP020A6LG. http://www.securiteam.com/securityreviews/, Feb. 2002.
-
(2002)
Timing Attacks on Web Privacy
-
-
Clover, A.1
-
7
-
-
0016949746
-
A lattice model of secure information ow
-
D. E. Denning. A lattice model of secure information ow. Commun. ACM, 19(5):236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
77950799484
-
Analyzing information ow in JavaScript-based browser extensions
-
C. Payne and M. Franz, editors IEEE Computer Society, Dec.
-
M. Dhawan and V. Ganapathy. Analyzing information ow in JavaScript-based browser extensions. In C. Payne and M. Franz, editors, Proceedings of ACSAC 2009, pages 382-91. IEEE Computer Society, Dec. 2009.
-
(2009)
Proceedings of ACSAC 2009
, pp. 382-91
-
-
Dhawan, M.1
Ganapathy, V.2
-
9
-
-
0034449227
-
Timing attacks on Web privacy
-
S. Jajodia, editor ACM Press, Nov
-
E. W. Felten and M. A. Schneider. Timing attacks on Web privacy. In S. Jajodia, editor, Proceedings of CCS 2000, pages 25-32. ACM Press, Nov. 2000.
-
(2000)
Proceedings of CCS 2000
, pp. 25-32
-
-
Felten, E.W.1
Schneider, M.A.2
-
12
-
-
34250634485
-
Protecting browser state from Web privacy attacks
-
C. Goble and M. Dahlin, editors ACM Press, May
-
C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from Web privacy attacks. In C. Goble and M. Dahlin, editors, Proceedings of WWW 2006, pages 737-44. ACM Press, May 2006.
-
(2006)
Proceedings of WWW 2006
, pp. 737-44
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
13
-
-
34250687159
-
Invasive browser sniffing and countermeasures
-
C. Goble and M. Dahlin, editors ACM Press, May
-
M. Jakobsson and S. Stamm. Invasive browser sniffing and countermeasures. In C. Goble and M. Dahlin, editors, Proceedings of WWW 2006, pages 523-32. ACM Press, May 2006.
-
(2006)
Proceedings of WWW 2006
, pp. 523-32
-
-
Jakobsson, M.1
Stamm, S.2
-
14
-
-
84860725517
-
Feasibility and real-world implications of Web browser history detection
-
C. Jackson, editor EEE Computer Society, May
-
A. Janc and L. Olejnik. Feasibility and real-world implications of Web browser history detection. In C. Jackson, editor, Proceedings of W2SP 2010. IEEE Computer Society, May 2010.
-
(2010)
Proceedings of W2SP 2010
-
-
Janc, A.1
Olejnik, L.2
-
15
-
-
78649986773
-
-
Technical report, University of California, San Diego, Jan. Online
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham. Rewriting-based dynamic information ow for JavaScript. Technical report, University of California, San Diego, Jan. 2010. Online: http://pho.ucsd.edu/rjhala/dif.pdf.
-
(2010)
Rewriting-based Dynamic Information Ow for JavaScript
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
16
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
P. Patel-Schneider and P. Shenoy, editors ACM Press, May
-
T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In P. Patel-Schneider and P. Shenoy, editors, Proceedings of WWW 2007, pages 601-10. ACM Press, May 2007.
-
(2007)
Proceedings of WWW 2007
, pp. 601-10
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
17
-
-
58549099340
-
JavaScript instrumentation in practice
-
G. Ramalingam, editor LNCS, Springer-Verlag, Dec.
-
H. Kikuchi, D. Yu, A. Chander, H. Inamura, and I. Serikov. JavaScript instrumentation in practice. In G. Ramalingam, editor, Proceedings of APLAS 2008, volume 5356 of LNCS, pages 326-41. Springer-Verlag, Dec. 2008.
-
(2008)
Proceedings of APLAS 2008
, vol.5356
, pp. 326-41
-
-
Kikuchi, H.1
Yu, D.2
Chander, A.3
Inamura, H.4
Serikov, I.5
-
18
-
-
77950880816
-
Securing Web applications with static and dynamic information ow tracking
-
R. Glück and O. de Moor, editors ACM Press, Jan.
-
M. S. Lam, M. Martin, V. B. Livshits, and J. Whaley. Securing Web applications with static and dynamic information ow tracking. In R. Glück and O. de Moor, editors, Proceedings of PEPM 2008, pages 3-12. ACM Press, Jan. 2008.
-
(2008)
Proceedings of PEPM 2008
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, V.B.3
Whaley, J.4
-
19
-
-
84970872854
-
On-the-y inlining of dynamic security monitors
-
K. Rannenberg and V. Varadharajan, editors, Sept.
-
J. Magazinius, A. Russo, and A. Sabelfeld. On-the-y inlining of dynamic security monitors. In K. Rannenberg and V. Varadharajan, editors, Proceedings of SEC 2010, Sept. 2010.
-
(2010)
Proceedings of SEC 2010
-
-
Magazinius, J.1
Russo, A.2
Sabelfeld, A.3
-
20
-
-
77955186827
-
Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser
-
IEEE Computer Society, 2010
-
L. A. Meyerovich and V. B. Livshits. Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In Proceedings of IEEE Security and Privacy ("Oakland") 2010, pages 481-496. IEEE Computer Society, 2010.
-
(2010)
Proceedings of IEEE Security and Privacy ("Oakland")
, pp. 481-496
-
-
Meyerovich, L.A.1
Livshits, V.B.2
-
21
-
-
24644460258
-
Programming with explicit security policies
-
M. Sagiv, editor LNCS, Springer-Verlag, Apr.
-
A. C. Myers. Programming with explicit security policies. In M. Sagiv, editor, Proceedings of ESOP 2005, volume 3444 of LNCS, pages 1-4. Springer-Verlag, Apr. 2005.
-
(2005)
Proceedings of ESOP 2005
, vol.3444
, pp. 1-4
-
-
Myers, A.C.1
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
D. Boneh and D. Simon, editors ISOC, Feb.
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In D. Boneh and D. Simon, editors, Proceedings of NDSS 2005. ISOC, Feb. 2005.
-
(2005)
Proceedings of NDSS 2005
-
-
Newsome, J.1
Song, D.X.2
-
23
-
-
0036037318
-
Information ow inference for ML
-
J. C. Mitchell, editor ACM Press, Jan.
-
F. Pottier and V. Simonet. Information ow inference for ML. In J. C. Mitchell, editor, Proceedings of POPL 2002, pages 319-330. ACM Press, Jan. 2002.
-
(2002)
Proceedings of POPL 2002
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
24
-
-
85080711655
-
The ghost in the browser: Analysis of Web-based malware
-
N. Provos, editor. USENIX, Apr.
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: Analysis of Web-based malware. In N. Provos, editor, Proceedings of HotBots 2007. USENIX, Apr. 2007.
-
(2007)
Proceedings of HotBots 2007
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
25
-
-
70350355123
-
Tracking information ow in dynamic tree structures
-
M. Backes and P. Ning, editors LNCS, Springer-Verlag, Sept.
-
A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information ow in dynamic tree structures. In M. Backes and P. Ning, editors, Proceedings of ESORICS 2009, volume 5789 of LNCS, pages 86-103. Springer-Verlag, Sept. 2009.
-
(2009)
Proceedings of ESORICS 2009
, vol.5789
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
26
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
D. Wallach, editor. USENIX, Aug.
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In D. Wallach, editor, Proceedings of USENIX Security 2001, pages 201-17. USENIX, Aug. 2001.
-
(2001)
Proceedings of USENIX Security 2001
, pp. 201-17
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
27
-
-
12844267418
-
Secure program execution via dynamic information ow tracking
-
K. McKinley, editor ACM Press, Oct.
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information ow tracking. In K. McKinley, editor, Proceedings of ASPLOS 2004, pages 85-96. ACM Press, Oct. 2004.
-
(2004)
Proceedings of ASPLOS 2004
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
28
-
-
33646037706
-
Secure information ow as a safety problem
-
C. Hankin, editor LNCS, Springer-Verlag, Sept.
-
T. Terauchi and A. Aiken. Secure information ow as a safety problem. In C. Hankin, editor, Proceedings of SAS 2005, volume 3672 of LNCS, pages 352-67. Springer-Verlag, Sept. 2005.
-
(2005)
Proceedings of SAS 2005
, vol.3672
, pp. 352-67
-
-
Terauchi, T.1
Aiken, A.2
-
29
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-ow security
-
A. González and J. P. Shen, editors IEEE Computer Society, Dec.
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-ow security. In A. González and J. P. Shen, editors, Proceedings of MICRO 2004, pages 243-54. IEEE Computer Society, Dec. 2004.
-
(2004)
Proceedings of MICRO 2004
, pp. 243-54
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
30
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
W. Arbaugh and C. Cowan, editors. ISOC, Feb.
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In W. Arbaugh and C. Cowan, editors, Proceedings of NDSS 2007. ISOC, Feb. 2007.
-
(2007)
Proceedings of NDSS 2007
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
31
-
-
0033705210
-
Verifying secrets and relative secrecy
-
T. Reps, editor ACM Press, Jan.
-
D. Volpano and G. Smith. Verifying secrets and relative secrecy. In T. Reps, editor, Proceedings of POPL 2000, pages 268-76. ACM Press, Jan. 2000.
-
(2000)
Proceedings of POPL 2000
, pp. 268-76
-
-
Volpano, D.1
Smith, G.2
-
32
-
-
34548253921
-
JavaScript instrumentation for browser security
-
M. Felleisen, editor ACM Press, Jan.
-
D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript instrumentation for browser security. In M. Felleisen, editor, Proceedings of POPL 2007, pages 237-49. ACM Press, Jan. 2007.
-
(2007)
Proceedings of POPL 2007
, pp. 237-49
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|