-
1
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Berlin, Heidelberg Springer-Verlag
-
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security, pages 333-348, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
ESORICS'08: Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
2
-
-
84948752619
-
Secure information flow and pointer confinement in a java-like language
-
IEEE Computer Society
-
Anindya Banerjee and David A. Naumann. Secure information flow and pointer confinement in a java-like language. In IEEE Computer Security Foundations Workshop, pages 253- 267. IEEE Computer Society, 2002.
-
(2002)
IEEE Computer Security Foundations Workshop
, pp. 253-267
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
67650663465
-
Secure information flow as a safety property
-
Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors of Lecture Notes in Computer Science Springer
-
Gérard Boudol. Secure information flow as a safety property. In Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors, Formal Aspects in Security and Trust, volume 5491 of Lecture Notes in Computer Science, pages 20-34. Springer, 2008.
-
(2008)
Formal Aspects in Security and Trust
, vol.5491
, pp. 20-34
-
-
Boudol, G.1
-
6
-
-
14844300105
-
Myers. Security policies for downgrading
-
New York, NY, USA ACM
-
Stephen Chong and Andrew C. Myers. Security policies for downgrading. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 198- 209, New York, NY, USA, 2004. ACM.
-
(2004)
CCS'04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 198-209
-
-
Chong, S.1
Andrew, C.2
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
84857184430
-
-
Available on the web at
-
Brendan Eich. Narcissus-JS implemented in JS. Available on the web at http://mxr.mozilla.org/ mozilla/source/js/narcissus/.
-
Narcissus-JS implemented in JS
-
-
Eich, B.1
-
10
-
-
0016382977
-
Memoryless subsystems
-
J. S. Fenton. Memoryless subsystems. The Computer Journal, 17 (2):143-147, 1974.
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
12
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
Cédric Fournet and Tamara Rezk. Cryptographically sound implementations for typed information-flow security. In Symposium on Principles of Programming Languages, pages 323-335, 2008.
-
(2008)
Symposium on Principles of Programming Languages
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
13
-
-
70450253198
-
Tracebased just-in-time type specialization for dynamic languages
-
Andreas Gal, Brendan Eich, Mike Shaver, David Anderson, Blake Kaplan, Graydon Hoare, David Mandelin, Boris Zbarsky, Jason Orendorff, Michael Bebenita, Mason Chang, Michael Franz, Edwin Smith, Rick Reitmaier, and Mohammad Haghighat. Tracebased just-in-time type specialization for dynamic languages. In Conference on Programming Language Design and Implementation, 2009.
-
(2009)
Conference on Programming Language Design and Implementation
-
-
Gal, A.1
Eich, B.2
Shaver, M.3
Anderson, D.4
Kaplan, B.5
Hoare, G.6
Mandelin, D.7
Zbarsky, B.8
Orendorff, J.9
Bebenita, M.10
Chang, M.11
Franz, M.12
Smith, E.13
Reitmaier, R.14
Haghighat, M.15
-
15
-
-
31744447223
-
Finegrained interoperability through mirrors and contracts
-
Kathryn E. Gray, Robert Bruce Findler, and Matthew Flatt. Finegrained interoperability through mirrors and contracts. In OOPSLA '05: Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pages 231-245, 2005.
-
(2005)
OOPSLA'05: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications
, pp. 231-245
-
-
Gray, K.E.1
Bruce Findler, R.2
Flatt, M.3
-
16
-
-
33846310068
-
Dynamic taint propagation for Java
-
DOI 10.1109/CSAC.2005.21, 1565257, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
Vivek Haldar, Deepak Chandra, and Michael Franz. Dynamic taint propagation for java. In ACSAC, pages 303-311. IEEE Computer Society, 2005. (Pubitemid 46116486)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
18
-
-
58449135488
-
Implicit flows: Can't live with 'em, can't live without 'em
-
Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In International Conference on Information Systems Security, pages 56-70, 2008.
-
(2008)
International Conference on Information Systems Security
, pp. 56-70
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
19
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
ACM, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation
-
Monica S. Lam, Michael Martin, V. Benjamin Livshits, and John Whaley. Securing web applications with static and dynamic information flow tracking. In Robert Glück and Oege de Moor, editors, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, pages 3-12. ACM, 2008.
-
(2008)
Robert Glück and Oege de Moor, Editors
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Benjamin Livshits, V.3
Whaley, J.4
-
22
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
John McLean. Proving noninterference and functional correctness using traces. Journal of Computer Security, 1(1):37-58, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 37-58
-
-
McLean, J.1
-
24
-
-
0031543270
-
A decentralized model for information flow control
-
Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In Symposium on Operating System Principles, pages 129-142, 1997. (Pubitemid 127466034)
-
(1997)
Operating Systems Review (ACM)
, vol.31
, Issue.5
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
25
-
-
33947681312
-
Information-flow security for interactive programs
-
DOI 10.1109/CSFW.2006.16, 1648718, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
Kevin R. O'Neill, Michael R. Clarkson, and Stephen Chong. Information-flow security for interactive programs. In IEEE Computer Security Foundations Workshop, pages 190-201. IEEE Computer Society, 2006. (Pubitemid 46499727)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 190-201
-
-
O'Neill, K.R.1
Clarkson, M.R.2
Chong, S.3
-
28
-
-
33646037706
-
Secure information flow as a safety problem
-
editors, SAS of Lecture Notes in Computer Science Springer
-
Tachio Terauchi and Alexander Aiken. Secure information flow as a safety problem. In Chris Hankin and Igor Siveroni, editors, SAS, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
-
(2005)
Chris Hankin and Igor Siveroni
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
29
-
-
85008603199
-
Provably correct runtime enforcement of non-interference properties
-
V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, and R. Sekar. Provably correct runtime enforcement of non-interference properties. In Information and Communications Security, pages 332- 351, 2006.
-
(2006)
Information and Communications Security
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
Duvarney, D.C.3
Sekar, R.4
-
30
-
-
84887309913
-
-
February URL
-
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. February 2007. URL http://www.infosys.tuwien.ac. at/Staff/ek/ papers/xss prevention.pdf.
-
(2007)
Cross site scripting prevention with dynamic data tainting and static analysis
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
31
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
32
-
-
79959917888
-
Programming languages for information security
-
PhD thesis, Ithaca, NY, USA
-
Stephan Arthur Zdancewic. Programming languages for information security. PhD thesis, Ithaca, NY, USA, 2002. Chair-Myers, , Andrew.
-
(2002)
Chair-Myers, Andrew
-
-
Arthur Zdancewic, S.1
|