메뉴 건너뛰기




Volumn 330, Issue , 2010, Pages 173-186

On-the-fly inlining of dynamic security monitors

Author keywords

[No Author keywords available]

Indexed keywords

CODE EVALUATION; DYNAMIC MONITORING; DYNAMIC SECURITY; INFORMATION FLOWS; NONINTERFERENCE PROPERTIES; RUNTIME ENVIRONMENTS; SECURE INFORMATION FLOW; SOURCE LANGUAGE;

EID: 84870603974     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-15257-3_16     Document Type: Conference Paper
Times cited : (21)

References (46)
  • 4
    • 67650663465 scopus 로고    scopus 로고
    • Secure information flow as a safety property
    • Springer, Heidelberg, In: Degano, P., Guttman, J., Martinelli, F. (eds.)
    • Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20-34. Springer, Heidelberg (2009)
    • (2009) FAST 2008. LNCS , vol.5491 , pp. 20-34
    • Boudol, G.1
  • 6
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • in, DeMillo R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.), Academic Press, London
    • Cohen, E.S.: Information transmission in sequential programs. In: DeMillo, R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.) Foundations of Secure Computation, pp. 297-335. Academic Press, London (1978)
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 84885074261 scopus 로고    scopus 로고
    • Facebook
    • Facebook. FBJS (2009), http://wiki.developers.facebook.com/index.php/FBJS
    • (2009) FBJS
  • 12
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton, J.S.: Memoryless subsystems. Computing J 17(2), 143-147 (1974)
    • (1974) Computing J , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 14
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM TOPLAS 28(1), 175-205 (2006)
    • (2006) ACM TOPLAS , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 16
    • 84949229854 scopus 로고    scopus 로고
    • Language-based security
    • Springer, Heidelberg, In: Kutyłowski, M., Wierzbicki, T., Pacholski, L. (eds.)
    • Kozen, D.: Language-based security. In: Kutyłowski, M., Wierzbicki, T., Pacholski, L. (eds.) MFCS 1999. LNCS, vol. 1672, pp. 284-298. Springer, Heidelberg (1999)
    • (1999) MFCS 1999. LNCS , vol.1672 , pp. 284-298
    • Kozen, D.1
  • 17
    • 35048820041 scopus 로고    scopus 로고
    • Automaton-based confidentiality monitoring of concurrent programs
    • in, July 2007
    • Le Guernic, G.: Automaton-based confidentiality monitoring of concurrent programs. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 218-232 (2007)
    • (2007) Proc. IEEE Computer Security Foundations Symposium , pp. 218-232
    • Le Guernic, G.1
  • 18
    • 49949102660 scopus 로고    scopus 로고
    • Automata-based confidentiality monitoring
    • In: Okada, M., Satoh, I. (eds.), Springer, Heidelberg
    • Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435. Springer, Heidelberg (2008)
    • (2008) ASIAN 2006. LNCS , vol.4435
    • Le Guernic, G.1    Banerjee, A.2    Jensen, T.3    Schmidt, D.4
  • 19
    • 0042733585 scopus 로고    scopus 로고
    • Java bytecode verification: Algorithms and formalizations
    • Leroy, X.: Java bytecode verification: algorithms and formalizations. J. Automated Reasoning 30(3-4), 235-269 (2003)
    • (2003) J. Automated Reasoning , vol.30 , Issue.3-4 , pp. 235-269
    • Leroy, X.1
  • 21
    • 70350371746 scopus 로고    scopus 로고
    • Isolating java Script with filters, rewriting, and wrappers
    • Springer, Heidelberg, In: Backes, M., Ning, P. (eds.)
    • Maffeis, S., Mitchell, J., Taly, A.: Isolating java Script with filters, rewriting, and wrappers. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 505-522. Springer, Heidelberg (2009)
    • (2009) ESORICS 2009. LNCS , vol.5789 , pp. 505-522
    • Maffeis, S.1    Mitchell, J.2    Taly, A.3
  • 22
    • 70350525212 scopus 로고    scopus 로고
    • Language-based isolation of untrusted Javascript
    • in, Los Alamitos (2009), See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3
    • Maffeis, S., Taly, A.: Language-based isolation of untrusted Javascript. In: Proc. of CSF'09. IEEE, Los Alamitos (2009), See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3 (2009)
    • (2009) Proc. of CSF'09. IEEE
    • Maffeis, S.1    Taly, A.2
  • 26
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • in, May 1994
    • McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proc. IEEE Symp. on Security and Privacy, May 1994, pp. 79-93 (1994)
    • (1994) Proc. IEEE Symp. on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 29
    • 34848907433 scopus 로고    scopus 로고
    • Browsershield: Vulnerabilitydriven filtering of dynamic html
    • Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: Browsershield: Vulnerabilitydriven filtering of dynamic html. ACM Trans. Web 1(3), 11 (2007)
    • (2007) ACM Trans. Web , vol.1 , Issue.3 , pp. 11
    • Reis, C.1    Dunagan, J.2    Wang, H.J.3    Dubrovsky, O.4    Esmeir, S.5
  • 32
    • 70350355123 scopus 로고    scopus 로고
    • Tracking information flow in dynamic tree structures
    • Springer, Heidelberg, In: Backes, M., Ning, P. (eds.)
    • Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86-103. Springer, Heidelberg (2009)
    • (2009) ESORICS 2009. LNCS , vol.5789 , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 38
    • 33646091639 scopus 로고    scopus 로고
    • Software release July
    • Simonet, V.: The Flow Caml system. Software release (July 2003), http://cristal.inria.fr/simonet/soft/flowcaml
    • (2003) The Flow Caml system
    • Simonet, V.1
  • 40
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • Springer, Heidelberg, In: Hankin, C., Siveroni, I. (eds.)
    • Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
    • (2005) SAS 2005. LNCS , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 41
    • 85008603199 scopus 로고    scopus 로고
    • Provably correct runtime enforcement of non-interference properties
    • Springer, Heidelberg, In: Ning, P., Qing, S., Li, N. (eds.)
    • Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
    • (2006) ICICS 2006. LNCS , vol.4307 , pp. 332-351
    • Venkatakrishnan, V.N.1    Xu, W.2    DuVarney, D.C.3    Sekar, R.4
  • 43
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy
    • Springer, Heidelberg, In: Cortesi, A., Filé, G. (eds.)
    • Volpano, D.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 303-311. Springer, Heidelberg (1999)
    • (1999) SAS 1999. LNCS , vol.1694 , pp. 303-311
    • Volpano, D.1
  • 44
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security 4(3), 167-187 (1996)
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 45
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • Wallach, D.S., Appel, A.W., Felten, E.W.: The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology 9(4), 341-378 (2000)
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4 , pp. 341-378
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.