메뉴 건너뛰기




Volumn 44, Issue 8, 2009, Pages 20-31

Efficient purely-dynamic information flow analysis

Author keywords

Dynamic analysis; Information flow control

Indexed keywords

BENCHMARK PROGRAMS; EVALUATION STRATEGIES; INFORMATION FLOW ANALYSIS; INFORMATION FLOW CONTROL; INFORMATION FLOWS; JAVASCRIPT; NON INTERFERENCE; SECURITY DOMAINS; SPEED-UPS;

EID: 79959879431     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1667209.1667223     Document Type: Article
Times cited : (48)

References (33)
  • 2
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a java-like language
    • IEEE Computer Society
    • Anindya Banerjee and David A. Naumann. Secure information flow and pointer confinement in a java-like language. In IEEE Computer Security Foundations Workshop, pages 253- 267. IEEE Computer Society, 2002.
    • (2002) IEEE Computer Security Foundations Workshop , pp. 253-267
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 67650663465 scopus 로고    scopus 로고
    • Secure information flow as a safety property
    • Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors of Lecture Notes in Computer Science Springer
    • Gérard Boudol. Secure information flow as a safety property. In Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors, Formal Aspects in Security and Trust, volume 5491 of Lecture Notes in Computer Science, pages 20-34. Springer, 2008.
    • (2008) Formal Aspects in Security and Trust , vol.5491 , pp. 20-34
    • Boudol, G.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 9
    • 84857184430 scopus 로고    scopus 로고
    • Available on the web at
    • Brendan Eich. Narcissus-JS implemented in JS. Available on the web at http://mxr.mozilla.org/ mozilla/source/js/narcissus/.
    • Narcissus-JS implemented in JS
    • Eich, B.1
  • 10
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • J. S. Fenton. Memoryless subsystems. The Computer Journal, 17 (2):143-147, 1974.
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 12
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • Cédric Fournet and Tamara Rezk. Cryptographically sound implementations for typed information-flow security. In Symposium on Principles of Programming Languages, pages 323-335, 2008.
    • (2008) Symposium on Principles of Programming Languages , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 19
    • 77950880816 scopus 로고    scopus 로고
    • Securing web applications with static and dynamic information flow tracking
    • ACM, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation
    • Monica S. Lam, Michael Martin, V. Benjamin Livshits, and John Whaley. Securing web applications with static and dynamic information flow tracking. In Robert Glück and Oege de Moor, editors, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, pages 3-12. ACM, 2008.
    • (2008) Robert Glück and Oege de Moor, Editors , pp. 3-12
    • Lam, M.S.1    Martin, M.2    Benjamin Livshits, V.3    Whaley, J.4
  • 22
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • John McLean. Proving noninterference and functional correctness using traces. Journal of Computer Security, 1(1):37-58, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-58
    • McLean, J.1
  • 24
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In Symposium on Operating System Principles, pages 129-142, 1997. (Pubitemid 127466034)
    • (1997) Operating Systems Review (ACM) , vol.31 , Issue.5 , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 25
    • 33947681312 scopus 로고    scopus 로고
    • Information-flow security for interactive programs
    • DOI 10.1109/CSFW.2006.16, 1648718, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • Kevin R. O'Neill, Michael R. Clarkson, and Stephen Chong. Information-flow security for interactive programs. In IEEE Computer Security Foundations Workshop, pages 190-201. IEEE Computer Society, 2006. (Pubitemid 46499727)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 190-201
    • O'Neill, K.R.1    Clarkson, M.R.2    Chong, S.3
  • 28
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • editors, SAS of Lecture Notes in Computer Science Springer
    • Tachio Terauchi and Alexander Aiken. Secure information flow as a safety problem. In Chris Hankin and Igor Siveroni, editors, SAS, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
    • (2005) Chris Hankin and Igor Siveroni , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 31
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 32
    • 79959917888 scopus 로고    scopus 로고
    • Programming languages for information security
    • PhD thesis, Ithaca, NY, USA
    • Stephan Arthur Zdancewic. Programming languages for information security. PhD thesis, Ithaca, NY, USA, 2002. Chair-Myers, , Andrew.
    • (2002) Chair-Myers, Andrew
    • Arthur Zdancewic, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.