메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 489-500

Security applications of formal language theory

Author keywords

Language theoretic security; secure composition; secure protocol design

Indexed keywords

DEVELOPMENT TECHNIQUE; DIFFERENTIAL ATTACKS; FORMAL LANGUAGE THEORY; LANGUAGE-THEORETIC SECURITY; PROGRAMMING METHODOLOGY; SECURE COMPOSITION; SECURE PROTOCOLS; SECURITY APPLICATION;

EID: 84880540238     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2012.2222000     Document Type: Article
Times cited : (46)

References (97)
  • 2
    • 84880515365 scopus 로고    scopus 로고
    • The compromised observer effect
    • F. F. X. Lindner, "The compromised observer effect," McAfee Security J., vol. 6, 2010.
    • (2010) McAfee Security J , vol.6
    • Lindner, F.F.X.1
  • 3
    • 79959561018 scopus 로고    scopus 로고
    • Some thoughts on security after ten years of qmail 1.0
    • D. J. Bernstein, "Some thoughts on security after ten years of qmail 1.0," in Proc. ACM CSAW, 2007, pp. 1-10.
    • (2007) Proc. ACM CSAW , pp. 1-10
    • Bernstein, D.J.1
  • 4
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Mar
    • L. Lamport, "Proving the correctness of multiprocess programs," IEEE Trans. Softw. Eng., vol. 3, no. 2, pp. 125-143, Mar. 1977.
    • (1977) IEEE Trans. Softw. Eng , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 5
    • 70350238531 scopus 로고    scopus 로고
    • Software model checking
    • R. Jhala and R. Majumdar, "Software model checking," ACM Comput. Surv., vol. 41, no. 4, 2009.
    • (2009) ACM Comput. Surv , vol.41 , Issue.4
    • Jhala, R.1    Majumdar, R.2
  • 7
    • 84880560861 scopus 로고    scopus 로고
    • Extending Bleichenbacher's forgery attack
    • Sep
    • T. Izu, T. Shimoyama, and M. Takenaka, "Extending Bleichenbacher's forgery attack," J. Inform. Process., vol. 16, pp. 122-129, Sep. 2008.
    • (2008) J. Inform. Process , vol.16 , pp. 122-129
    • Izu, T.1    Shimoyama, T.2    Takenaka, M.3
  • 8
    • 77955313164 scopus 로고    scopus 로고
    • PKI layer cake: New collision attacks against the global X.509 infrastructure
    • Berlin, Germany Springer
    • D. Kaminsky, M. L. Patterson, and L. Sassaman, "PKI layer cake: New collision attacks against the global X.509 infrastructure," in Financial Cryptography. Berlin, Germany: Springer, 2010, pp. 289-303.
    • (2010) Financial Cryptography , pp. 289-303
    • Kaminsky, D.1    Patterson, M.L.2    Sassaman, L.3
  • 9
    • 0034905530 scopus 로고    scopus 로고
    • L(A) = L(B)? decidability results from complete formal systems
    • DOI 10.1016/S0304-3975(00)00285-1, PII S0304397500002851
    • G. Śenizergues, "L(A) = L(B)? Decidability results from complete formal systems," Theor. Comput. Sci., vol. 251, nos. 1-2, pp. 1-166, 2001. (Pubitemid 32674076)
    • (2001) Theoretical Computer Science , vol.251 , Issue.1-2 , pp. 1-166
    • Senizergues, G.1
  • 11
    • 26444481880 scopus 로고    scopus 로고
    • A simple proof for the turing-completeness of XSLT and xQuery
    • S. Kepser, "A simple proof for the turing-completeness of XSLT and xQuery," in Proc. Extreme Markup Lang., 2004.
    • (2004) Proc. Extreme Markup Lang
    • Kepser, S.1
  • 14
    • 8744267587 scopus 로고    scopus 로고
    • Universality in Elementary Cellular Automata
    • M. Cook, "Universality in elementary cellular automata," Complex Syst., vol. 15, no. 1, pp. 1-40, 2004. (Pubitemid 39203440)
    • (2004) Complex Systems Champaign , vol.15 , Issue.1 , pp. 1-40
    • Cook, M.1
  • 17
    • 85040933729 scopus 로고    scopus 로고
    • TRX: A formally verified parser interpreter
    • Proc. Prog. Lang. Syst
    • A. Koprowski and H. Binsztok, "TRX: A formally verified parser interpreter," in Proc. Prog. Lang. Syst., LNCS 6012. 2010, pp. 345-365.
    • (2010) LNCS , vol.6012 , pp. 345-365
    • Koprowski, A.1    Binsztok, H.2
  • 19
    • 49749213366 scopus 로고
    • On certain formal properties of grammars
    • N. Chomsky, "On certain formal properties of grammars," Inform. Comput./Inform. Control, vol. 2, pp. 137-167, 1959.
    • (1959) Inform. Comput./Inform. Control , vol.2 , pp. 137-167
    • Chomsky, N.1
  • 21
  • 23
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol reverse engineering from network traces
    • W. Cui, J. Kannan, and H. J. Wang, "Discoverer: Automatic protocol reverse engineering from network traces," in Proc. USENIX Sec. Symp., 2007.
    • (2007) Proc. USENIX Sec. Symp
    • Cui, W.1    Kannan, J.2    Wang, H.J.3
  • 26
    • 84880531411 scopus 로고    scopus 로고
    • A study on visual programming extension of JavaScript
    • Mar.
    • W. Ali, K. Sultana, and S. Pervez, "A study on visual programming extension of JavaScript," Int. J. Comput. Appl., vol. 17, no. 1, pp. 13-19, Mar. 2011.
    • (2011) Int. J. Comput. Appl , vol.17 , Issue.1 , pp. 13-19
    • Ali, W.1    Sultana, K.2    Pervez, S.3
  • 27
    • 84880520550 scopus 로고
    • A final solution to the dangling else of ALGOL 60 and related languages
    • Sep
    • P. W. Abrahams, "A final solution to the dangling else of ALGOL 60 and related languages," Commun. ACM, vol. 9, pp. 679-682, Sep. 1966.
    • (1966) Commun ACM , vol.9 , pp. 679-682
    • Abrahams, P.W.1
  • 28
    • 0001621268 scopus 로고
    • On the translation of languages from left to right
    • D. E. Knuth, "On the translation of languages from left to right," Inform. Control, vol. 8, no. 6, pp. 607-639, 1965.
    • (1965) Inform. Control , vol.8 , Issue.6 , pp. 607-639
    • Knuth, D.E.1
  • 29
    • 70349381520 scopus 로고    scopus 로고
    • The usability of ambiguity detection methods for context-free grammars
    • Oct
    • H. J. S. Basten, "The usability of ambiguity detection methods for context-free grammars," Electron. Notes Theor. Comput. Sci., vol. 238, pp. 35-46, Oct. 2009.
    • (2009) Electron. Notes Theor. Comput. Sci , vol.238 , pp. 35-46
    • Basten, H.J.S.1
  • 30
    • 50149119692 scopus 로고
    • On ambiguity in phrase structure languages
    • Oct
    • R. W. Floyd, "On ambiguity in phrase structure languages," Commun. ACM, vol. 5, p. 526, Oct. 1962.
    • (1962) Commun ACM , vol.5 , pp. 526
    • Floyd, R.W.1
  • 31
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Jul
    • C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, Jul. 1948.
    • (1948) Bell Syst. Tech. J , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 34
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • C. A. R. Hoare, "An axiomatic basis for computer programming," Commu. ACM, vol. 12, no. 10, pp. 576-583, 1969.
    • (1969) Commu ACM , vol.12 , Issue.10 , pp. 576-583
    • Hoare, C.A.R.1
  • 36
    • 84945713135 scopus 로고
    • Applying dsign by contract
    • Oct
    • B. Meyer, "Applying dsign by contract," Computer, vol. 25, pp. 40-51, Oct. 1992.
    • (1992) Computer , vol.25 , pp. 40-51
    • Meyer, B.1
  • 41
    • 33745213901 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • T. Pietraszek and C. V. Berghe, "Defending against injection attacks through context-sensitive string evaluation," in Proc. RAID, 2005, pp. 124-145.
    • (2005) Proc. RAID , pp. 124-145
    • Pietraszek, T.1    Berghe, C.V.2
  • 43
    • 84880529329 scopus 로고    scopus 로고
    • rix Aug Phrack [Online]
    • rix. (2001, Aug.). Writing ia32 alphanumeric shellcodes. Phrack [Online]. 57(5). Available: http://www.phrack.com/issues.html?issue=57\ &id=15
    • (2001) Writing ia32 Alphanumeric Shellcodes , vol.57 , pp. 5
  • 44
    • 84880566270 scopus 로고    scopus 로고
    • Nergal Dec Phrack [Online]
    • Nergal. (2001, Dec.). The advanced return-into-lib(c) exploits: PaX case study. Phrack [Online]. 58(4). Available: http://www.phrack.com/issues.html? issue=58&id=4
    • (2001) The Advanced Return-into-lib(c) Exploits: PaX Case Study , vol.58 , pp. 4
  • 46
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
    • H. Shacham, "The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)," in Proc. CCS, 2007.
    • (2007) Proc. CCS
    • Shacham, H.1
  • 47
    • 14844288825 scopus 로고    scopus 로고
    • Jul Phrack [Online]
    • T. Durden. (2002, Jul.). Bypassing PaX ASLR protection. Phrack [Online]. 59(9). Available: http://www.phrack.com/issues.html?issue= 59\&id=9
    • (2002) Bypassing PaX ASLR Protection , vol.59 , pp. 9
    • Durden, T.1
  • 48
    • 0006100649 scopus 로고    scopus 로고
    • Aug Phrack [Online]
    • A. One. (1996, Aug.). Smashing the stack for fun and profit. Phrack [Online]. 49(14). Available: http://www.phrack.com/issues.html?issue= 49\&id=14
    • (1996) Smashing the Stack for Fun and Profit , vol.49 , pp. 14
    • One, A.1
  • 49
    • 84880556811 scopus 로고    scopus 로고
    • MaXX Phrack [Online]
    • MaXX. Vudo malloc Tricks. Phrack [Online]. 57(8). Available: http://phrack.org/issues.html?issue=57&id=8
    • Vudo Malloc Tricks , vol.57 , pp. 8
  • 50
    • 84880540965 scopus 로고    scopus 로고
    • Anonymous author Phrack [Online]
    • Anonymous author. Once upon a free(). Phrack [Online]. 57(9). Available: http://phrack.org/issues.html?issue=57&id=9
    • Once Upon A Free , vol.57 , pp. 9
  • 51
    • 84880565899 scopus 로고    scopus 로고
    • jp Aug Phrack [Online]
    • jp. (2003, Aug.). Advanced Doug Lea's malloc exploits. Phrack [Online]. 61(6). Available: http://www.phrack.com/issues.html?issue=61\ &id=6
    • (2003) Advanced Doug Lea's Malloc Exploits , vol.61 , pp. 6
  • 52
    • 12344288334 scopus 로고    scopus 로고
    • Sep [Online] Available
    • T. Newsham. (2000, Sep.). Format String Attacks [Online]. Available: http://www.thenewsh.com/?newsham/format-string-attacks.pdf
    • (2000) Format String Attacks
    • Newsham, T.1
  • 55
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • F. Valeur, D. Mutz, and G. Vigna, "A learning-based approach to the detection of SQL attacks," in Proc. DIMVA, Jul. 2005, pp. 123-140. (Pubitemid 41423153)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3
  • 57
    • 77949464016 scopus 로고    scopus 로고
    • CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
    • P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan, "CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks," ACM Trans. Inf. Syst. Security, vol. 13, no. 2, pp. 1-39, 2010.
    • (2010) ACM Trans. Inf. Syst. Security , vol.13 , Issue.2 , pp. 1-39
    • Bisht, P.1    Madhusudan, P.2    Venkatakrishnan, V.N.3
  • 58
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Z. Su and G. Wassermann, "The essence of command injection attacks in web applications," in Proc. 33rd Symp. Principles Program. Lang., 2006, pp. 372-382.
    • (2006) Proc. 33rd Symp. Principles Program. Lang , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 60
    • 34648836594 scopus 로고    scopus 로고
    • Static checking of dynamically generated queries in database applications
    • G. Wassermann, C. Gould, Z. Su, and P. Devanbu, "Static checking of dynamically generated queries in database applications," J. ACM Trans. Softw. Eng. Methodol., vol. 16, no. 4, 2007.
    • (2007) J. ACM Trans. Softw. Eng. Methodol , vol.16 , Issue.4
    • Wassermann, G.1    Gould, C.2    Su, Z.3    Devanbu, P.4
  • 61
    • 33750143286 scopus 로고    scopus 로고
    • Preventing SQL injection attacks in stored procedures
    • DOI 10.1109/ASWEC.2006.40, 1615052, Proceedings - 2006 Australian Software Engineering Conference, ASWEC 2006 - Taming Complexity through Research and Practice
    • K. Wei, M. Muthuprasanna, and S. Kothari, "Preventing SQL injection attacks in stored procedures," in Proc. Aus. Softw. Eng. Conf., 2006, pp. 191-198. (Pubitemid 44592153)
    • (2006) Proceedings of the Australian Software Engineering Conference, ASWEC , vol.2006 , pp. 191-198
    • Wei, K.1    Muthuprasanna, M.2    Kothari, S.3
  • 63
    • 4544287108 scopus 로고    scopus 로고
    • JDBC checker: A static analysis tool for SQL/JDBC applications
    • C. Gould, Z. Su, and P. Devanbu, "JDBC checker: A static analysis tool for SQL/JDBC applications," in Proc. Int. Conf. Soft. Eng., 2004, pp. 697-698.
    • (2004) Proc. Int. Conf. Soft. Eng , pp. 697-698
    • Gould, C.1    Su, Z.2    Devanbu, P.3
  • 65
    • 84880567176 scopus 로고    scopus 로고
    • Retrofitting existing web applications with effective dynamic protection against SQL injection attacks
    • Jan
    • S.-T. Sun and K. Beznosov, "Retrofitting existing web applications with effective dynamic protection against SQL injection attacks," Int. J. Secure Softw. Eng., vol. 1, pp. 20-40, Jan. 2010.
    • (2010) Int. J. Secure Softw. Eng , vol.1 , pp. 20-40
    • Sun, S.-T.1    Beznosov, K.2
  • 66
    • 77952407110 scopus 로고    scopus 로고
    • AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks
    • Nov
    • W. G. J. Halfond and A. Orso, "AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks," in Proc. ASE 2005, Nov. 2005, pp. 174-183.
    • (2005) Proc. ASE , vol.2005 , pp. 174-183
    • Halfond, W.G.J.1    Orso, A.2
  • 69
    • 52449092059 scopus 로고    scopus 로고
    • SQL-IDS: A specification-based approach for SQL-injection detection
    • K. Kemalis and T. Tzouramanis, "SQL-IDS: A specification-based approach for SQL-injection detection," in Proc. Symp. Appl. Comput., 2008, pp. 2153-2158.
    • (2008) Proc. Symp. Appl. Comput , pp. 2153-2158
    • Kemalis, K.1    Tzouramanis, T.2
  • 70
    • 72949084588 scopus 로고    scopus 로고
    • SQLProb: A proxybased architecture toward preventing SQL injection attacks
    • A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, "SQLProb: A proxybased architecture toward preventing SQL injection attacks," in Proc. ACM Symp. Appl. Comput., 2009, pp. 2054-2061.
    • (2009) Proc. ACM Symp. Appl. Comput , pp. 2054-2061
    • Liu, A.1    Yuan, Y.2    Wijesekera, D.3    Stavrou, A.4
  • 73
    • 0001538613 scopus 로고
    • Semantics of context-free languages
    • D. Knuth, "Semantics of context-free languages," Math. Syst. Theory, vol. 2, pp. 127-145, 1968.
    • (1968) Math. Syst. Theory , vol.2 , pp. 127-145
    • Knuth, D.1
  • 74
    • 77955332716 scopus 로고    scopus 로고
    • Mar [Online] Available
    • B. Kaliski. (1998, Mar.). PKCS 1: RSA Encryption [Online]. Available: http://tools.ietf.org/html/rfc2313
    • (1998) PKCS 1: RSA Encryption
    • Kaliski, B.1
  • 75
    • 1442287671 scopus 로고    scopus 로고
    • Parsing expression grammars: A recognition-based syntactic foundation
    • B. Ford, "Parsing expression grammars: A recognition-based syntactic foundation," in Proc. 31st ACM SIGPLAN-SIGACT Symp. POPL, 2004 pp. 111-122.
    • (2004) Proc. 31st ACM SIGPLAN-SIGACT Symp. POPL , pp. 111-122
    • Ford, B.1
  • 76
    • 33750093555 scopus 로고    scopus 로고
    • Measuring relative attack surfaces
    • D. T. Lee, S. P. Shieh, and J. D. Tygar, Eds. New York: Springer
    • M. Howard, J. Pincus, and J. Wing, "Measuring relative attack surfaces," in Computer Security in the 21st Century, D. T. Lee, S. P. Shieh, and J. D. Tygar, Eds. New York: Springer, 2005, pp. 109-137.
    • (2005) Computer Security in the 21st Century , pp. 109-137
    • Howard, M.1    Pincus, J.2    Wing, J.3
  • 77
    • 51049122345 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation list (CRL) Profile
    • 4325, 4630 May
    • D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation list (CRL) Profile, RFC 5280, Obsoletes RFCs 3280, 4325, 4630, May 2008.
    • (2008) RFC 5280, Obsoletes RFCs , vol.3280
    • Cooper, D.1    Santesson, S.2    Farrell, S.3    Boeyen, S.4    Housley, R.5    Polk, W.6
  • 79
    • 24344478834 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • May
    • N. Mathewson and R. Dingledine, "Practical traffic analysis: Extending and resisting statistical disclosure," in Proc. PET Workshop, LNCS 3424. May 2004, pp. 17-34.
    • (2004) Proc. PET Workshop, LNCS , vol.3424 , pp. 17-34
    • Mathewson, N.1    Dingledine, R.2
  • 80
    • 84880544409 scopus 로고    scopus 로고
    • Failures in a hybrid content blocking system
    • R. Clayton, "Failures in a hybrid content blocking system," in Proc. Fifth PET Workshop, 2005, p. 1.
    • (2005) Proc. Fifth PET Workshop , pp. 1
    • Clayton, R.1
  • 81
    • 84880515365 scopus 로고    scopus 로고
    • The compromised observer effect
    • F. Lindner, "The compromised observer effect," McAfee Security J., vol. 6, 2010.
    • (2010) McAfee Security J , vol.6
    • Lindner, F.1
  • 84
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics," in Proc. 10th USENIX Security Symp., 2001, p. 9.
    • (2001) Proc. 10th USENIX Security Symp , pp. 9
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 85
    • 0038825042 scopus 로고    scopus 로고
    • Active mapping: Resisting NIDS evasion without altering traffic
    • May
    • U. Shankar and V. Paxson, "Active mapping: Resisting NIDS evasion without altering traffic," in Proc. IEEE Symp. Security Privacy, May 2003, pp. 44-61.
    • (2003) Proc. IEEE Symp. Security Privacy , pp. 44-61
    • Shankar, U.1    Paxson, V.2
  • 86
    • 77949414424 scopus 로고    scopus 로고
    • Dec [Online]. Available
    • S. Siddharth. (2005, Dec.). Evading NIDS, Revisited [Online]. Available: http://www.symantec.com/connect/articles/evading-nids-revisited
    • (2005) Evading NIDS, Revisited
    • Siddharth, S.1
  • 87
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • Feb
    • T. Garfinkel, "Traps and pitfalls: Practical problems in system call interposition based security tools," in Proc. Netw. Distributed Syst. Security Symp., Feb. 2003, pp. 163-176.
    • (2003) Proc. Netw. Distributed Syst. Security Symp , pp. 163-176
    • Garfinkel, T.1
  • 88
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection system using sequences of system calls
    • S. A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion detection system using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Somayaji, A.2    Forrest, S.3
  • 90
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • Nov
    • D. Wagner and P. Soto, "Mimicry attacks on host-based intrusion detection systems," in Proc. ACM Conf. CCS, Nov. 2002, pp. 255-264.
    • (2002) Proc. ACM Conf. CCS , pp. 255-264
    • Wagner, D.1    Soto, P.2
  • 91
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm a provocative discussion
    • DOI 10.1145/1278940.1278945, Proceedings - New Security Paradigms Workshop 2006
    • C. Taylor and C. Gates, "Challenging the anomaly detection paradigm: A provocative discussion," in Proc. 15th NSPW, Sep. 2006, pp. 21-29. (Pubitemid 350239697)
    • (2007) Proceedings New Security Paradigms Workshop , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 92
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • May
    • R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in Proc. IEEE Symp. Security Privacy, May 2010, pp. 305-316.
    • (2010) Proc. IEEE Symp. Security Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 93
    • 84957039800 scopus 로고    scopus 로고
    • Principles of a computer immune system
    • A. Somayaji, S. Hofmeyer, and S. Forrest, "Principles of a computer immune system," in Proc. NPSW, 1998, pp. 75-82.
    • (1998) Proc. NPSW , pp. 75-82
    • Somayaji, A.1    Hofmeyer, S.2    Forrest, S.3
  • 95
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Feb
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, pp. 30-50, Feb. 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , pp. 30-50
    • Schneider, F.B.1
  • 96
    • 84884203329 scopus 로고    scopus 로고
    • Modular verification of security protocol code by typing
    • K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular verification of security protocol code by typing," SIGPLAN Not., vol. 45, 2010.
    • (2010) SIGPLAN Not , vol.45
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 97
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • S. Chaki and A. Datta, "ASPIER: An automated framework for verifying security protocol implementations," in Proc. CSF, 2009, pp. 172-185.
    • (2009) Proc. CSF , pp. 172-185
    • Chaki, S.1    Datta, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.