메뉴 건너뛰기




Volumn 7273 LNCS, Issue , 2012, Pages 186-202

Secure multi-execution through static program transformation

Author keywords

[No Author keywords available]

Indexed keywords

ALTERNATIVE APPROACH; CODE EVALUATION; DYNAMIC TECHNIQUES; IMPLEMENTATION TECHNIQUES; INPUT/OUTPUT; INPUT/OUTPUT OPERATIONS; JAVASCRIPT; PROGRAM TRANSFORMATIONS; PROOF ASSISTANT; PROTOTYPE IMPLEMENTATIONS; RUNTIME ENVIRONMENTS; RUNTIMES; SECURE INFORMATION FLOW; SECURITY LEVEL; STATIC PROGRAM; WEB APPLICATION;

EID: 84862731005     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30793-5_12     Document Type: Conference Paper
Times cited : (17)

References (31)
  • 1
    • 70350542799 scopus 로고    scopus 로고
    • Tight enforcement of information-release policies for dynamic languages
    • Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: CSF, pp. 43-59 (2009)
    • (2009) CSF , pp. 43-59
    • Askarov, A.1    Sabelfeld, A.2
  • 2
    • 84857879906 scopus 로고    scopus 로고
    • Multiple facets for dynamic information flow
    • Austin, T., Flanagan, C.: Multiple facets for dynamic information flow. In: POPL (2012)
    • (2012) POPL
    • Austin, T.1    Flanagan, C.2
  • 3
    • 77954893910 scopus 로고    scopus 로고
    • Permissive dynamic information flow analysis
    • Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS (2010)
    • (2010) PLAS
    • Austin, T.H.1    Flanagan, C.2
  • 5
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • Barthe, G., D'Argenio, P.R., Rezk, T.: Secure information flow by self-composition. In: CSFW, pp. 100-114 (2004)
    • (2004) CSFW , pp. 100-114
    • Barthe, G.1    D'Argenio, P.R.2    Rezk, T.3
  • 9
    • 77952379069 scopus 로고    scopus 로고
    • Secure slices of insecure programs
    • Cavadini, S.: Secure slices of insecure programs. In: ASIACCS, pp. 112-122 (2008)
    • (2008) ASIACCS , pp. 112-122
    • Cavadini, S.1
  • 10
    • 77957563684 scopus 로고    scopus 로고
    • Information flow monitor inlining
    • Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: CSF, pp. 200-214 (2010)
    • (2010) CSF , pp. 200-214
    • Chudnov, A.1    Naumann, D.A.2
  • 12
    • 84862733646 scopus 로고    scopus 로고
    • Runtime enforcement of noninterference by duplicating processes and their memories
    • Cristiá, M., Mata, P.: Runtime enforcement of noninterference by duplicating processes and their memories. In: WSEGI 2009 (2009)
    • (2009) WSEGI 2009
    • Cristiá, M.1    Mata, P.2
  • 13
    • 84862752549 scopus 로고    scopus 로고
    • December
    • Crockford, D.: Adsafe (December 2009), http://www.adsafe.org/
    • (2009)
    • Crockford, D.1
  • 15
    • 84862731029 scopus 로고    scopus 로고
    • Facebook. Fbjs (2011), http://developers.facebook.com/docs/fbjs/
    • (2011) Fbjs
  • 18
    • 84862730668 scopus 로고    scopus 로고
    • Secure multi-execution in haskell
    • Jaskelioff, M., Russo, A.: Secure multi-execution in haskell. In: PSI (2011)
    • (2011) PSI
    • Jaskelioff, M.1    Russo, A.2
  • 20
    • 84907402135 scopus 로고    scopus 로고
    • Adjail: Practical enforcement of confidentiality and integrity policies on web advertisements
    • Louw, M.T., Ganesh, K.T., Venkatakrishnan, V.N.: Adjail: Practical enforcement of confidentiality and integrity policies on web advertisements. In: USENIX Security Symposium, pp. 371-388 (2010)
    • (2010) USENIX Security Symposium , pp. 371-388
    • Louw, M.T.1    Ganesh, K.T.2    Venkatakrishnan, V.N.3
  • 21
    • 70350371746 scopus 로고    scopus 로고
    • Isolating JavaScript with Filters, Rewriting, and Wrappers
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Maffeis, S., Mitchell, J.C., Taly, A.: Isolating JavaScript with Filters, Rewriting, and Wrappers. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 505-522. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 505-522
    • Maffeis, S.1    Mitchell, J.C.2    Taly, A.3
  • 25
    • 79961132987 scopus 로고    scopus 로고
    • The Eval That Men Do
    • Mezini, M. (ed.) ECOOP 2011. Springer, Heidelberg
    • Richards, G., Hammer, C., Burg, B., Vitek, J.: The Eval That Men Do. In: Mezini, M. (ed.) ECOOP 2011. LNCS, vol. 6813, pp. 52-78. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6813 , pp. 52-78
    • Richards, G.1    Hammer, C.2    Burg, B.3    Vitek, J.4
  • 26
    • 70350521681 scopus 로고    scopus 로고
    • Securing timeout instructions in web applications
    • Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: CSF, pp. 92-106 (2009)
    • (2009) CSF , pp. 92-106
    • Russo, A.1    Sabelfeld, A.2
  • 27
    • 70350355123 scopus 로고    scopus 로고
    • Tracking Information Flow in Dynamic Tree Structures
    • Backes,M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Russo, A., Sabelfeld, A., Chudnov, A.: Tracking Information Flow in Dynamic Tree Structures. In: Backes,M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86-103. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 28
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • Sabelfeld, A., Myers, A.C.: Language-based information-flow security. JSAC 21, 5-19 (2003)
    • (2003) JSAC , vol.21 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 29
    • 77951106085 scopus 로고    scopus 로고
    • From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research
    • Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. Springer, Heidelberg
    • Sabelfeld, A., Russo, A.: From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol. 5947, pp. 352-365. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5947 , pp. 352-365
    • Sabelfeld, A.1    Russo, A.2
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.