메뉴 건너뛰기




Volumn 47, Issue 1, 2012, Pages 165-177

Multiple facets for dynamic information flow

Author keywords

Dynamic analysis; Information flow control; JavaScript; Web security

Indexed keywords

CROSS SITE SCRIPTING; DATA CONFIDENTIALITY; DYNAMIC INFORMATION; FIREFOX; INFORMATION FLOW CONTROL; INFORMATION FLOW SECURITY; INFORMATION FLOWS; JAVASCRIPT; NEW MECHANISMS; NON INTERFERENCE; SECURITY LEVEL; SECURITY POLICY; SECURITY PROBLEMS; STATIC TYPE SYSTEMS; WEB APPLICATION; WEB SECURITY;

EID: 84857163173     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2103621.2103677     Document Type: Conference Paper
Times cited : (95)

References (40)
  • 1
    • 57049111067 scopus 로고    scopus 로고
    • Termination-insensitive noninterference leaks more than just a bit
    • Springer-Verlag
    • Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08, pages 333-348. Springer-Verlag, 2008.
    • (2008) ESORICS '08 , pp. 333-348
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 2
    • 85040944657 scopus 로고    scopus 로고
    • A semantic framework for declassification and endorsement
    • Aslan Askarov and Andrew Myers. A semantic framework for declassification and endorsement. In ESOP, pages 64-84, 2010.
    • (2010) ESOP , pp. 64-84
    • Askarov, A.1    Myers, A.2
  • 3
    • 70350542799 scopus 로고    scopus 로고
    • Tight enforcement of information-release policies for dynamic languages
    • Washington, DC, USA IEEE Computer Society
    • Aslan Askarov and Andrei Sabelfeld. Tight enforcement of information-release policies for dynamic languages. In IEEE Computer Security Foundations Symposium, pages 43-59, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) IEEE Computer Security Foundations Symposium , pp. 43-59
    • Askarov, A.1    Sabelfeld, A.2
  • 9
    • 60649120947 scopus 로고    scopus 로고
    • Preventing information leaks through shadow executions
    • dec
    • R. Capizzi, A. Longo, V.N. Venkatakrishnan, and A.P. Sistla. Preventing information leaks through shadow executions. In ACSAC, pages 322-331, dec 2008.
    • (2008) ACSAC , pp. 322-331
    • Capizzi, R.1    Longo, A.2    Venkatakrishnan, V.N.3    Sistla, A.P.4
  • 10
    • 14844300105 scopus 로고    scopus 로고
    • Security policies for downgrading
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Stephen Chong and Andrew C. Myers. Security policies for downgrading. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 198-209, New York, NY, USA, 2004. ACM. (Pubitemid 40338201)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 198-209
    • Chong, S.1    Myers, A.C.2
  • 11
    • 70450253203 scopus 로고    scopus 로고
    • Staged information flow for javascript
    • Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, and Sorin Lerner. Staged information flow for javascript. In PLDI, pages 50-62, 2009.
    • (2009) PLDI , pp. 50-62
    • Chugh, R.1    Meister, J.A.2    Jhala, R.3    Lerner, S.4
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 13
    • 77955223614 scopus 로고    scopus 로고
    • Noninterference through secure multi-execution
    • IEEE Symposium on
    • Dominique Devriese and Frank Piessens. Noninterference through secure multi-execution. Security and Privacy, IEEE Symposium on, 0:109-124, 2010.
    • (2010) Security and Privacy , pp. 109-124
    • Devriese, D.1    Piessens, F.2
  • 14
    • 77950799484 scopus 로고    scopus 로고
    • Analyzing information flow in javascript-based browser extensions
    • Mohan Dhawan and Vinod Ganapathy. Analyzing information flow in javascript-based browser extensions. In ACSAC, pages 382-391, 2009.
    • (2009) ACSAC , pp. 382-391
    • Dhawan, M.1    Ganapathy, V.2
  • 16
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • J. S. Fenton. Memoryless subsystems. The Computer Journal, 17(2):143-147, 1974.
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 18
  • 20
    • 33745218338 scopus 로고    scopus 로고
    • On flow-sensitive security types
    • Sebastian Hunt and David Sands. On flow-sensitive security types. In POPL, pages 79-90, 2006.
    • (2006) POPL , pp. 79-90
    • Hunt, S.1    Sands, D.2
  • 22
    • 85075799758 scopus 로고    scopus 로고
    • accessed October 2010
    • Jif homepage. http://www.cs.cornell.edu/jif/, accessed October 2010.
    • Jif Homepage
  • 23
    • 80051974927 scopus 로고    scopus 로고
    • Timing-and termination-sensitive secure information flow: Exploring a new approach
    • Vineeth Kashyap, Ben Wiedermann, and Ben Hardekopf. Timing-and termination-sensitive secure information flow: Exploring a new approach. In IEEE Security and Privacy, 2011.
    • (2011) IEEE Security and Privacy
    • Kashyap, V.1    Wiedermann, B.2    Hardekopf, B.3
  • 32
    • 70350355123 scopus 로고    scopus 로고
    • Tracking information flow in dynamic tree structures
    • Alejandro Russo, Andrei Sabelfeld, and Andrey Chudnov. Tracking information flow in dynamic tree structures. In ESORICS, pages 86-103, 2009.
    • (2009) ESORICS , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 33
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • IEEE Journal on Jan
    • Andrei Sabelfeld and Andrew C. Myers. Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 21(1):5-19, Jan 2003.
    • (2003) Selected Areas in Communications , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 34
  • 35
    • 80051974928 scopus 로고    scopus 로고
    • Inference of expressive declassification policies
    • Jeffrey Vaughan and Stephen Chong. Inference of expressive declassification policies. In IEEE Security and Privacy, 2011.
    • (2011) IEEE Security and Privacy
    • Vaughan, J.1    Chong, S.2
  • 36
    • 84887309913 scopus 로고    scopus 로고
    • Cross site scripting prevention with dynamic data tainting and static analysis
    • Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, and Giovanni Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Krügel, C.5    Vigna, G.6
  • 37
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 38
    • 84870460434 scopus 로고    scopus 로고
    • Webkit.org accessed October 2011
    • Webkit.org. SunSpider JavaScript benchmark. http://www.webkit.org/perf/ sunspider/sunspider.html, accessed October 2011.
    • SunSpider JavaScript Benchmark


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.