-
1
-
-
0037842787
-
The SLAM project: Debugging system software via static analysis
-
T. Ball and S. K. Rajamani. The SLAM project: Debugging system software via static analysis. In ACM POPL, 2002.
-
(2002)
ACM POPL
-
-
Ball, T.1
Rajamani, S.K.2
-
3
-
-
85166275153
-
Protecting browsers from extension vulnerabilities
-
A. Barth, A. P. Felt, and P. Saxena. Protecting browsers from extension vulnerabilities. In NDSS, 2010.
-
(2010)
NDSS
-
-
Barth, A.1
Felt, A.P.2
Saxena, P.3
-
4
-
-
80052006758
-
-
CA Technologies. Virus details: Win32/clspring family. http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?ID=42280, 2006.
-
(2006)
Virus Details: Win32/Clspring Family
-
-
-
5
-
-
80051988347
-
Type-preserving compilation of end-to-end verification of security enforcement
-
J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-to-end verification of security enforcement. In ACM PLDI, 2010.
-
(2010)
ACM PLDI
-
-
Chen, J.1
Chugh, R.2
Swamy, N.3
-
7
-
-
47249164288
-
Z3: An efficient SMT solver
-
L. de Moura and N. Bjorner. Z3: An efficient SMT solver. In TACAS, 2008.
-
(2008)
TACAS
-
-
De Moura, L.1
Bjorner, N.2
-
8
-
-
77950799484
-
Analyzing information flow in JavaScript-based browser extensions
-
M. Dhawan and V Ganapathy. Analyzing information flow in JavaScript-based browser extensions. In ACSAC, 2009.
-
(2009)
ACSAC
-
-
Dhawan, M.1
Ganapathy, V.2
-
9
-
-
84903607772
-
Dynamic spyware analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
11
-
-
84864749040
-
RePriv: Re-envisioning in-browser privacy
-
M. Fredrikson and B. Livshits. RePriv: Re-envisioning in- browser privacy. In IEEE S&P, 2011.
-
(2011)
IEEE S&P
-
-
Fredrikson, M.1
Livshits, B.2
-
15
-
-
77950853552
-
Secure web browsing with the OP web browser
-
C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Grier, C.1
Tang, S.2
King, S.T.3
-
16
-
-
33645587554
-
Model checking and modular verification
-
O. Grumberg and D. E. Long. Model checking and modular verification. ACM TOPLAS, 16, 1994.
-
ACM TOPLAS
, vol.16
, pp. 1994
-
-
Grumberg, O.1
Long, D.E.2
-
17
-
-
84890883068
-
GateKeeper: Mostly static enforcement of security and reliability policies for JavaScript code
-
S. Guarnieri and B. Livshits. GateKeeper: Mostly static enforcement of security and reliability policies for JavaScript code. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Guarnieri, S.1
Livshits, B.2
-
20
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. A. Kemmerer. Behavior-based spyware detection. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
22
-
-
77955000017
-
Language support for extensible web browsers
-
B. Lerner and D. Grossman. Language support for extensible web browsers. In APLWACA, 2010.
-
(2010)
APLWACA
-
-
Lerner, B.1
Grossman, D.2
-
23
-
-
80051967419
-
-
submission
-
B. Lerner, H. Venter, B. Burg, and W. Schulte. C3: An experimental extensible, reconfigurable platform for HTML-based applications, 2010. In submission.
-
C3: An Experimental Extensible, Reconfigurable Platform for HTML-based Applications, 2010
-
-
Lerner, B.1
Venter, H.2
Burg, B.3
Schulte, W.4
-
26
-
-
80051997549
-
ConScript: Specifying and enforcing fine-grained security policies for javascript in the browser
-
L. Meyerovich and B. Livshits. ConScript: Specifying and enforcing fine-grained security policies for Javascript in the browser. In oakland, 2010.
-
(2010)
Oakland
-
-
Meyerovich, L.1
Livshits, B.2
-
27
-
-
78650102256
-
-
Mozilla Foundation. How many Firefox users use addons? http://blog.mozilla.com/addons/2009/08/11/how-many-firefox-users-use-add-ons/, 2009.
-
(2009)
How Many Firefox Users use Addons?
-
-
-
29
-
-
85177638687
-
A theory of typed coercions and its applications
-
N. Swamy, M. Hicks, and G. Bierman. A theory of typed coercions and its applications. In ACM ICFP, 2009.
-
(2009)
ACM ICFP
-
-
Swamy, N.1
Hicks, M.2
Bierman, G.3
-
30
-
-
85040949627
-
Enforcing stateful authorization and information flow policies in fine
-
N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP, 2010.
-
(2010)
ESOP
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
31
-
-
79952161645
-
Security programming with refinement types and mobile proofs
-
MSR-TR-2010-149
-
N. Swamy, J. Chen, C. Fournet, K. Bhargavan, and J. Yang. Security programming with refinement types and mobile proofs. Technical report, MSR, 2010. MSR-TR-2010-149.
-
(2010)
Technical Report, MSR
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Bhargavan, K.4
Yang, J.5
-
33
-
-
77954608267
-
The multi-principal OS construction of the gazelle web browser
-
H. Wang, C. Grier, E. Moshcuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Wang, H.1
Grier, C.2
Moshcuk, E.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
34
-
-
77950856518
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In IEEE S&P, 2009.
-
(2009)
IEEE S&P
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
36
-
-
85177689449
-
SafeDrive: Safe and recoverable extensions using language-based techniques
-
F Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. SafeDrive: Safe and recoverable extensions using language-based techniques. In USENIX OSDI, 2006.
-
(2006)
USENIX OSDI
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
|