-
1
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Springer-Verlag
-
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08, pages 333-348. Springer-Verlag, 2008.
-
(2008)
ESORICS '08
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
2
-
-
85040944657
-
A semantic framework for declassification and endorsement
-
Aslan Askarov and Andrew Myers. A semantic framework for declassification and endorsement. In ESOP, pages 64-84, 2010.
-
(2010)
ESOP
, pp. 64-84
-
-
Askarov, A.1
Myers, A.2
-
3
-
-
70350542799
-
Tight enforcement of information-release policies for dynamic languages
-
Washington, DC, USA IEEE Computer Society
-
Aslan Askarov and Andrei Sabelfeld. Tight enforcement of information-release policies for dynamic languages. In IEEE Computer Security Foundations Symposium, pages 43-59, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
IEEE Computer Security Foundations Symposium
, pp. 43-59
-
-
Askarov, A.1
Sabelfeld, A.2
-
5
-
-
70450239729
-
Efficient purely-dynamic information flow analysis
-
New York, NY, USA ACM
-
Thomas H. Austin and Cormac Flanagan. Efficient purely-dynamic information flow analysis. In PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, pages 113-124, New York, NY, USA, 2009. ACM.
-
(2009)
PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
, pp. 113-124
-
-
Austin, T.H.1
Flanagan, C.2
-
8
-
-
74049102285
-
Reactive noninterference
-
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, and Steve Zdancewic. Reactive noninterference. In ACM Conference on Computer and Communications Security, pages 79-90, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 79-90
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
9
-
-
60649120947
-
Preventing information leaks through shadow executions
-
dec
-
R. Capizzi, A. Longo, V.N. Venkatakrishnan, and A.P. Sistla. Preventing information leaks through shadow executions. In ACSAC, pages 322-331, dec 2008.
-
(2008)
ACSAC
, pp. 322-331
-
-
Capizzi, R.1
Longo, A.2
Venkatakrishnan, V.N.3
Sistla, A.P.4
-
10
-
-
14844300105
-
Security policies for downgrading
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Stephen Chong and Andrew C. Myers. Security policies for downgrading. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 198-209, New York, NY, USA, 2004. ACM. (Pubitemid 40338201)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 198-209
-
-
Chong, S.1
Myers, A.C.2
-
11
-
-
70450253203
-
Staged information flow for javascript
-
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, and Sorin Lerner. Staged information flow for javascript. In PLDI, pages 50-62, 2009.
-
(2009)
PLDI
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
77955223614
-
Noninterference through secure multi-execution
-
IEEE Symposium on
-
Dominique Devriese and Frank Piessens. Noninterference through secure multi-execution. Security and Privacy, IEEE Symposium on, 0:109-124, 2010.
-
(2010)
Security and Privacy
, pp. 109-124
-
-
Devriese, D.1
Piessens, F.2
-
14
-
-
77950799484
-
Analyzing information flow in javascript-based browser extensions
-
Mohan Dhawan and Vinod Ganapathy. Analyzing information flow in javascript-based browser extensions. In ACSAC, pages 382-391, 2009.
-
(2009)
ACSAC
, pp. 382-391
-
-
Dhawan, M.1
Ganapathy, V.2
-
16
-
-
0016382977
-
Memoryless subsystems
-
J. S. Fenton. Memoryless subsystems. The Computer Journal, 17(2):143-147, 1974.
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
18
-
-
49949102660
-
Automata-based confidentiality monitoring
-
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jensen, and David A. Schmidt. Automata-based confidentiality monitoring. In ASIAN, pages 75-89, 2006.
-
(2006)
ASIAN
, pp. 75-89
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.P.3
Schmidt, D.A.4
-
20
-
-
33745218338
-
On flow-sensitive security types
-
Sebastian Hunt and David Sands. On flow-sensitive security types. In POPL, pages 79-90, 2006.
-
(2006)
POPL
, pp. 79-90
-
-
Hunt, S.1
Sands, D.2
-
21
-
-
78649998785
-
An empirical study of privacy-violating information flows in javascript web applications
-
Dongseok Jang, Ranjit Jhala, Sorin Lerner, and Hovav Shacham. An empirical study of privacy-violating information flows in javascript web applications. In ACM Conference on Computer and Communications Security, pages 270-283, 2010.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 270-283
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
22
-
-
85075799758
-
-
accessed October 2010
-
Jif homepage. http://www.cs.cornell.edu/jif/, accessed October 2010.
-
Jif Homepage
-
-
-
23
-
-
80051974927
-
Timing-and termination-sensitive secure information flow: Exploring a new approach
-
Vineeth Kashyap, Ben Wiedermann, and Ben Hardekopf. Timing-and termination-sensitive secure information flow: Exploring a new approach. In IEEE Security and Privacy, 2011.
-
(2011)
IEEE Security and Privacy
-
-
Kashyap, V.1
Wiedermann, B.2
Hardekopf, B.3
-
24
-
-
58449135488
-
Implicit flows: Can't live with 'em, can't live without 'em
-
Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In International Conference on Information Systems Security, pages 56-70, 2008.
-
(2008)
International Conference on Information Systems Security
, pp. 56-70
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
25
-
-
84869813985
-
Rozzle: De-cloaking internet malware
-
Clemens Kolbitsch, Benjamin Livshits, Benjamin Zorn, and Christian Seifert. Rozzle: De-cloaking internet malware. Technical Report MSR-TR-2011-94, Microsoft Research Technical Report, 2001.
-
(2001)
Technical Report MSR-TR-2011-94, Microsoft Research Technical Report
-
-
Kolbitsch, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
32
-
-
70350355123
-
Tracking information flow in dynamic tree structures
-
Alejandro Russo, Andrei Sabelfeld, and Andrey Chudnov. Tracking information flow in dynamic tree structures. In ESORICS, pages 86-103, 2009.
-
(2009)
ESORICS
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
33
-
-
0037251378
-
Language-based information-flow security
-
IEEE Journal on Jan
-
Andrei Sabelfeld and Andrew C. Myers. Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 21(1):5-19, Jan 2003.
-
(2003)
Selected Areas in Communications
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
34
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
DOI 10.1109/CSF.2007.20, 4271650, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
Paritosh Shroff, Scott F. Smith, and Mark Thober. Dynamic dependency monitoring to secure information flow. In CSF, pages 203-217, 2007. (Pubitemid 47554215)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 203-217
-
-
Shroff, P.1
Smith, S.F.2
Thober, M.3
-
35
-
-
80051974928
-
Inference of expressive declassification policies
-
Jeffrey Vaughan and Stephen Chong. Inference of expressive declassification policies. In IEEE Security and Privacy, 2011.
-
(2011)
IEEE Security and Privacy
-
-
Vaughan, J.1
Chong, S.2
-
36
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, and Giovanni Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
37
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
38
-
-
84870460434
-
-
Webkit.org accessed October 2011
-
Webkit.org. SunSpider JavaScript benchmark. http://www.webkit.org/perf/ sunspider/sunspider.html, accessed October 2011.
-
SunSpider JavaScript Benchmark
-
-
|