-
1
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
K. Singh, A. Moshchuk, H. Wang, and W. Lee, "On the incoherencies in web browser access control policies", in SSP, 2010.
-
(2010)
SSP
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.3
Lee, W.4
-
2
-
-
84869427671
-
Featherweight firefox: Formalizing the core of a web browser
-
A. Bohannon and B. C. Pierce, "Featherweight Firefox: Formalizing the core of a web browser", in WebApps, 2010.
-
(2010)
WebApps
-
-
Bohannon, A.1
Pierce, B.C.2
-
3
-
-
0037251378
-
Language-based information-flow security
-
A. Sabelfeld and A. C. Myers, "Language-based information-flow security", in JSAC, vol. 21, 2003, pp. 5-19.
-
(2003)
JSAC
, vol.21
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
6
-
-
77956566246
-
Mash-IF: Practical information-flow control within client-side mashups
-
Z. Li, K. Zhang, and X. Wang, "Mash-IF: Practical Information-Flow Control within Client-side Mashups", in DSN, 2010, pp. 251-260.
-
(2010)
DSN
, pp. 251-260
-
-
Li, Z.1
Zhang, K.2
Wang, X.3
-
7
-
-
84907402135
-
AdJail: Practical enforcement of confidentiality and integrity policies on web advertisements
-
M. Louw, K. Ganesh, and V. Venkatakrishnan, "AdJail: Practical enforcement of confidentiality and integrity policies on web advertisements", in USENIX, 2010.
-
(2010)
USENIX
-
-
Louw, M.1
Ganesh, K.2
Venkatakrishnan, V.3
-
8
-
-
70450253203
-
Staged information flow for Javascript
-
R. Chugh, J. Meister, R. Jhala, and S. Lerner, "Staged information flow for Javascript", in PLDI, 2009.
-
(2009)
PLDI
-
-
Chugh, R.1
Meister, J.2
Jhala, R.3
Lerner, S.4
-
9
-
-
77955223614
-
Non-interference through secure multiexecution
-
D. Devriese and F. Piessens, "Non-interference through secure multiexecution", in SSP, 2010.
-
(2010)
SSP
-
-
Devriese, D.1
Piessens, F.2
-
10
-
-
74049102285
-
Reactive noninterference
-
A. Bohannon, B. C. Pierce, V. Sjöberg, S. Weirich, and S. Zdancewic, "Reactive noninterference", in CCS, 2009.
-
(2009)
CCS
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
12
-
-
48349136934
-
On Javascript malware and related threats
-
-, "On Javascript malware and related threats", JCV, vol. 4, pp. 161-178, 2008.
-
(2008)
JCV
, vol.4
, pp. 161-178
-
-
Johns, M.1
-
13
-
-
84887309913
-
Crosssite scripting prevention with dynamic data tainting and static analysis
-
F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna, "Crosssite scripting prevention with dynamic data tainting and static analysis", in NDSS, 2007.
-
(2007)
NDSS
-
-
Nentwich, F.1
Jovanovic, N.2
Kirda, E.3
Kruegel, C.4
Vigna, G.5
-
14
-
-
0000892681
-
A tutorial on (co) algebras and (co) induction
-
B. Jacobs and J. Rutten, "A tutorial on (co) algebras and (co) induction", EATCS Bulletin, vol. 62, pp. 62-222, 1997.
-
(1997)
EATCS Bulletin
, vol.62
, pp. 62-222
-
-
Jacobs, B.1
Rutten, J.2
-
15
-
-
60649120947
-
Preventing information leaks through shadow executions
-
R. Capizzi, A. Longo, V. Venkatakrishnan, and A. Sistla, "Preventing information leaks through shadow executions", in ACSAC, 2008.
-
(2008)
ACSAC
-
-
Capizzi, R.1
Longo, A.2
Venkatakrishnan, V.3
Sistla, A.4
-
16
-
-
80051974927
-
Timing-and termination-sensitive secure information flow: Exploring a new approach
-
V. Kashyap, B. Wiedermann, and B. Hardekopf, "Timing-and termination-sensitive secure information flow: Exploring a new approach", in SSP, 2011.
-
(2011)
SSP
-
-
Kashyap, V.1
Wiedermann, B.2
Hardekopf, B.3
-
17
-
-
81055140554
-
Reactive non-interference for the browser: Extended version
-
February, Online. Available
-
N. Bielova, D. Devriese, F. Massacci, and F. Piessens, "Reactive non-interference for the browser: extended version", CS Dept., K. U. Leuven, Tech. Rep. CW602, February 2011. [Online]. Available: http://www.cs.kuleuven. be/publicaties/rapporten/cw/CW602.abs.html
-
(2011)
CS Dept., K. U. Leuven, Tech. Rep. CW602
-
-
Bielova, N.1
Devriese, D.2
Massacci, F.3
Piessens, F.4
-
18
-
-
70350548311
-
Declassification: Dimensions and principles
-
October, Online. Available
-
A. Sabelfeld and D. Sands, "Declassification: Dimensions and principles", JCS, vol. 17, pp. 517-548, October 2009. [Online]. Available: http://portal.acm.org/citation. cfm?id=1662658.1662659
-
(2009)
JCS
, vol.17
, pp. 517-548
-
-
Sabelfeld, A.1
Sands, D.2
-
19
-
-
77954893910
-
Permissive dynamic information flow analysis
-
T. Austin and C. Flanagan, "Permissive dynamic information flow analysis", in PLAS, 2010.
-
(2010)
PLAS
-
-
Austin, T.1
Flanagan, C.2
|