-
5
-
-
17044429386
-
Stack-based access control and secure information flow
-
Mar.
-
A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(2):131-177, Mar. 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
81055139598
-
Reactive non-interference for a browser model
-
Sept.
-
N. Bielova, D. Devriese, F. Massacci, and F. Piessens. Reactive non-interference for a browser model. In Proc. International Conference on Network and System Security (NSS), pages 97-104, Sept. 2011.
-
(2011)
Proc. International Conference on Network and System Security (NSS)
, pp. 97-104
-
-
Bielova, N.1
Devriese, D.2
Massacci, F.3
Piessens, F.4
-
8
-
-
74049102285
-
Reactive noninterference
-
Nov.
-
A. Bohannon, B. Pierce, V. Sjöberg, S. Weirich, and S. Zdancewic. Reactive noninterference. In ACM Conference on Computer and Communications Security, pages 79-90, Nov. 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 79-90
-
-
Bohannon, A.1
Pierce, B.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
10
-
-
67650844248
-
Staged information flow for javascript
-
PLDI '09, New York, NY, USA ACM
-
R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged information flow for javascript. In Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, PLDI '09, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
11
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
12
-
-
84866936611
-
-
Coq. http://coq.inria.fr.
-
-
-
-
14
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
20
-
-
84866917687
-
-
Facebook
-
Facebook. FBJS. http://wiki.developers.facebook.com/index. php/FBJS, 2009.
-
(2009)
FBJS
-
-
-
21
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
-
(1974)
Computing J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
23
-
-
84890883068
-
Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
-
SSYM'09, Berkeley, CA, USA USENIX Association
-
S. Guarnieri and B. Livshits. Gatekeeper: mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
-
-
Guarnieri, S.1
Livshits, B.2
-
24
-
-
80052015113
-
Verified security for browser extensions
-
SP '11, Washington, DC, USA IEEE Computer Society
-
A. Guha, M. Fredrikson, B. Livshits, and N. Swamy. Verified security for browser extensions. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, Washington, DC, USA, 2011. IEEE Computer Society.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy
-
-
Guha, A.1
Fredrikson, M.2
Livshits, B.3
Swamy, N.4
-
28
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript web applications
-
Oct.
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham. An empirical study of privacy-violating information flows in JavaScript web applications. In ACM Conference on Computer and Communications Security, pages 270-283, Oct. 2010.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 270-283
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
29
-
-
58549113236
-
An operational semantics for JavaScript
-
S. Maffeis, J. C. Mitchell, and A. Taly. An operational semantics for JavaScript. In Proc. of APLAS'08, volume 5356 of LNCS, pages 307-325, 2008.
-
(2008)
Proc. of APLAS'08, Volume 5356 of LNCS
, pp. 307-325
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
31
-
-
70349127409
-
-
M. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized javascript, 2008.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
32
-
-
0005260169
-
-
Software release. Located July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nys-trom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
(2001)
Jif: Java Information Flow
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nys-Trom, N.5
-
33
-
-
0348017041
-
Information flow inference for ML
-
Jan.
-
F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, Jan. 2003.
-
(2003)
ACM TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
38
-
-
84860275167
-
Security of web mashups: A survey
-
LNCS
-
P. D. Ryck, M. Decat, L. Desmet, F. Piessens, and W. Joose. Security of web mashups: a survey. In Nordic Conference in Secure IT Systems, LNCS, 2010.
-
(2010)
Nordic Conference in Secure IT Systems
-
-
Ryck, P.D.1
Decat, M.2
Desmet, L.3
Piessens, F.4
Joose, W.5
-
41
-
-
80052006519
-
Automated analysis of security-critical JavaScript APIs
-
May
-
A. Taly, U. Erlingsson, M. Miller, J. Mitchell, and J. Nagra. Automated analysis of security-critical JavaScript APIs. In Proc. IEEE Symp. on Security and Privacy, May 2011.
-
(2011)
Proc. IEEE Symp. on Security and Privacy
-
-
Taly, A.1
Erlingsson, U.2
Miller, M.3
Mitchell, J.4
Nagra, J.5
-
42
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
Feb.
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proc. Network and Distributed System Security Symposium, Feb. 2007.
-
(2007)
Proc. Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
44
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
45
-
-
33846497980
-
JavaScript instrumentation for browser security
-
ACM
-
D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript instrumentation for browser security. In Proc. ACM Symp. on Principles of Programming Languages, pages 237-249. ACM, 2007.
-
(2007)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|