-
1
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), pages 147-160, 1999.
-
(1999)
ACM SIGPLAN Symposium on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
3
-
-
0003515463
-
-
Prentice Hall
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network flows: theory, algorithms, and applications. Prentice Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
4
-
-
33751073715
-
A logic for information flow analysis with an application to forward slicing of simple imperative programs
-
DOI 10.1016/j.scico.2006.03.002, PII S0167642306001559
-
T. Amtoft and A. Banerjee. A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Computer Programming (SCP), 64(1):3-28, 2007. (Pubitemid 44765091)
-
(2007)
Science of Computer Programming
, vol.64
, Issue.1 SPEC. ISS.
, pp. 3-28
-
-
Amtoft, T.1
Banerjee, A.2
-
5
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In European Symposium on Research in Computer Security (ESORICS), pages 333-348, 2008.
-
(2008)
European Symposium on Research in Computer Security (ESORICS)
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
8
-
-
35348884907
-
Exposing private information by timing web applications
-
DOI 10.1145/1242572.1242656, 16th International World Wide Web Conference, WWW2007
-
A. Bortz and D. Boneh. Exposing private information by timing web applications. In International Conference on World Wide Web (WWW), pages 621-628, 2007. (Pubitemid 47582291)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 621-628
-
-
Bortz, A.1
Boneh, D.2
Nandy, P.3
-
9
-
-
84879520825
-
Noninterference for concurrent programs
-
Automata, Languages and Programming
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In International Colloquium on Automata, Languages and Programming (ICALP), pages 382-395, 2001. (Pubitemid 33300815)
-
(2001)
Lecture Notes in Computer Science
, Issue.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM (CACM), 19(5):236-243, 1976.
-
(1976)
Communications of the ACM (CACM)
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
12
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM (CACM), 20(7):504-513, 1977.
-
(1977)
Communications of the ACM (CACM)
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
14
-
-
85177641403
-
-
Personal communication, November
-
D. Devriese and F. Piessens. Personal communication, November 2010.
-
(2010)
-
-
Devriese, D.1
Piessens, F.2
-
15
-
-
84954462346
-
A practical implementation of the timing attack
-
J. F. Dhem, F. Koeune, P. A. Leroux, P. Mestré, J. J. Quisquater, and J. L. Willems. A Practical Implementation of the Timing Attack. In International Conference on Smart Card Research and Applications (CARDIS), pages 167-182, 2000.
-
(2000)
International Conference on Smart Card Research and Applications (CARDIS)
, pp. 167-182
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.A.3
Mestré, P.4
Quisquater, J.J.5
Willems, J.L.6
-
17
-
-
33745473816
-
Timed abstract non-interference
-
3829 LNCS, DOI 10.1007/11603009-22, Formal Modeling and Analysis of Timed Systems - Third International Conference, FORMATS 2005, Proceedings
-
R. Giacobazzi and I. Mastroeni. Timed Abstract Non-interference. In Formal Modeling and Analysis of Timed Systems, volume 3829 of Lecture Notes in Computer Science, chapter 22, pages 289-303. 2005. (Pubitemid 43952402)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 289-303
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
21
-
-
28044445125
-
Timing aware information flow security for a javaCard-like bytecode
-
DOI 10.1016/j.entcs.2005.02.031, PII S1571066105051492
-
D. Hedin and D. Sands. Timing aware information flow security for a javacard-like bytecode. Electronic Notes in Theoretical Computer Science, 141(1):163-182, 2005. (Pubitemid 41689008)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.141
, Issue.1 SPEC. ISS.
, pp. 163-182
-
-
Hedin, D.1
Sands, D.2
-
25
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Advances in Cryptology - CRYPTO '96
-
P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In International Cryptology Conference on Advances in Cryptology (CRYPTO), pages 104-113, 1996. (Pubitemid 126106234)
-
(1996)
Lecture Ns in Computer Science
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
26
-
-
0031543270
-
A decentralized model for information flow control
-
A. C. Myers and B. Liskov. A decentralized model for information flow control. SIGOPS Operating Systems Review (OSR), 31(5):129-142, October 1997. (Pubitemid 127466034)
-
(1997)
Operating Systems Review (ACM)
, vol.31
, Issue.5
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
27
-
-
84867997005
-
A fast algorithm for the maximum clique problem
-
P. R. J. Östergård. A fast algorithm for the maximum clique problem. Discrete Applied Mathematics, 120(1-3):197-207, 2002.
-
(2002)
Discrete Applied Mathematics
, vol.120
, Issue.1-3
, pp. 197-207
-
-
Östergård, P.R.J.1
-
29
-
-
49949108946
-
Closing internal timing channels by transformation
-
A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld. Closing internal timing channels by transformation. In Asian Computing Science Conference on Advances in Computer Science (ASIAN), pages 120-135, 2007.
-
(2007)
Asian Computing Science Conference on Advances in Computer Science (ASIAN)
, pp. 120-135
-
-
Russo, A.1
Hughes, J.2
Naumann, D.3
Sabelfeld, A.4
-
30
-
-
33947645959
-
Securing interaction between threads and the scheduler
-
DOI 10.1109/CSFW.2006.29, 1648717, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
A. Russo and A. Sabelfeld. Securing interaction between threads and the scheduler. In IEEE Workshop on Computer Security Foundations, pages 177-189, 2006. (Pubitemid 46499726)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 177-189
-
-
Russo, A.1
Sabelfeld, A.2
-
36
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
Proceedings of the 37th Annual International Symposium on Microarchitecture, MICRO-37 2004
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In IEEE/ACM International Symposium on Microarchitecture (MICRO), pages 243-254, 2004. (Pubitemid 40927702)
-
(2004)
Proceedings of the Annual International Symposium on Microarchitecture, MICRO
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
37
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computing Security, 4(2-3):167-187, 1996.
-
(1996)
Journal of Computing Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
39
-
-
80051982001
-
Timing attacks on RSA: Revealing your secrets through the fourth dimension
-
May
-
W. H. Wong. Timing attacks on RSA: revealing your secrets through the fourth dimension. Crossroads, 11(3):5, May 2005.
-
(2005)
Crossroads
, vol.11
, Issue.3
, pp. 5
-
-
Wong, W.H.1
|