-
1
-
-
84878558984
-
Protection in programming-language translations
-
M. Abadi. Protection in programming-language translations. In ICALP, volume 1443, pages 868-883, 1998.
-
(1998)
ICALP
, vol.1443
, pp. 868-883
-
-
Abadi, M.1
-
2
-
-
77957600240
-
On protection by layout randomization
-
M. Abadi and G. D. Plotkin. On protection by layout randomization. In IEEE CSF, pages 337-351, 2010.
-
(2010)
IEEE CSF
, pp. 337-351
-
-
Abadi, M.1
Plotkin, G.D.2
-
3
-
-
0037052276
-
Secure implementation of channel abstractions
-
Apr.
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, Apr. 2002.
-
(2002)
Information and Computation
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
4
-
-
84866925595
-
Secure compilation to modern processors
-
P. Agten, R. Strackx, B. Jacobs, and F. Piessens. Secure compilation to modern processors. In IEEE CSF, pages 171-185, 2012.
-
(2012)
IEEE CSF, 171-185
-
-
Agten, P.1
Strackx, R.2
Jacobs, B.3
Piessens, F.4
-
5
-
-
59249097625
-
Typed closure conversion preserves observational equivalence
-
A. Ahmed and M. Blume. Typed closure conversion preserves observational equivalence. In ICFP, 2008.
-
(2008)
ICFP
-
-
Ahmed, A.1
Blume, M.2
-
8
-
-
47249164288
-
Z3: An efficient SMT solver
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS, 2008.
-
(2008)
TACAS
-
-
De Moura, L.1
Bjørner, N.2
-
10
-
-
33749590020
-
Securing the.NET programming model
-
A. Kennedy. Securing the .NET programming model. TCS, 364(3), 2006.
-
(2006)
TCS
, vol.364
, Issue.3
-
-
Kennedy, A.1
-
11
-
-
26844560861
-
Eager normal form bisimulation
-
S. Lassen. Eager normal form bisimulation. LICS, 2005.
-
(2005)
LICS
-
-
Lassen, S.1
-
13
-
-
0002891241
-
Towards a mathematical science of computation
-
J. McCarthy. Towards a mathematical science of computation. In IFIP Congress, pages 21-28, 1962.
-
(1962)
IFIP Congress
, pp. 21-28
-
-
McCarthy, J.1
-
14
-
-
84874147849
-
Conscript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
-
L. A. Meyerovich and V. B. Livshits. Conscript: Specifying and enforcing fine-grained security policies for JavaScript in the browser. In IEEE S&P, 2010.
-
(2010)
IEEE S&P
-
-
Meyerovich, L.A.1
Livshits, V.B.2
-
15
-
-
0027684079
-
On abstraction and the expressive power of programming languages
-
J. C. Mitchell. On abstraction and the expressive power of programming languages. Science of Computer Programming, 21(2):141-163, 1993.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 141-163
-
-
Mitchell, J.C.1
-
16
-
-
0015561577
-
Protection in programming languages
-
J. H. Morris. Protection in programming languages. In CACM (16), 1973.
-
(1973)
CACM
, Issue.16
-
-
Morris, J.H.1
-
17
-
-
84869774097
-
A tested semantics for getters, setters, and eval in JavaScript
-
J. Politz, M. Carroll, B. Lerner, J. Pombrio, and S. Krishnamurthi. A tested semantics for getters, setters, and eval in JavaScript. In DLS, 2012.
-
(2012)
DLS
-
-
Politz, J.1
Carroll, M.2
Lerner, B.3
Pombrio, J.4
Krishnamurthi, S.5
-
20
-
-
29144437303
-
A bisimulation for type abstraction and recursion
-
E. Sumii and B. C. Pierce. A bisimulation for type abstraction and recursion. In POPL, 2005.
-
(2005)
POPL
-
-
Sumii, E.1
Pierce, B.C.2
-
21
-
-
80054054746
-
Secure distributed programming with value-dependent types
-
N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bhargavan, and J. Yang. Secure distributed programming with value-dependent types. In ICFP, 2011.
-
(2011)
ICFP
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.-Y.4
Bhargavan, K.5
Yang, J.6
-
22
-
-
84874146103
-
-
Technical Report MSR-TR-2012-37, Mar
-
N. Swamy, J.Weinberger, C. Schlesinger, J. Chen, and B. Livshits. Towards JavaScript verification with the Dijkstra state monad. Technical Report MSR-TR-2012-37, Mar 2012.
-
(2012)
Towards JavaScript Verification with the Dijkstra State Monad
-
-
Swamy, N.1
Weinberger, J.2
Schlesinger, C.3
Chen, J.4
Livshits, B.5
-
23
-
-
84874136514
-
Automated analysis of security-critical JavaScript APIs
-
A. Taly, U. Erlingsson, J. C. Mitchell, M. S. Miller, and J. Nagra. Automated analysis of security-critical JavaScript APIs. In IEEE S&P, 2011.
-
(2011)
IEEE S&P
-
-
Taly, A.1
Erlingsson, U.2
Mitchell, J.C.3
Miller, M.S.4
Nagra, J.5
|