-
2
-
-
84870656305
-
Sharing Mobile Code Securely With Information Flow Control
-
O. Arden, M. D. George, J. Liu, K. Vikram, A. Askarov, and A. C. Myers. Sharing Mobile Code Securely With Information Flow Control. In Proceedings of the IEEE Symposium on Security and Privacy, 2012.
-
Proceedings of the IEEE Symposium on Security and Privacy, 2012
-
-
Arden, O.1
George, M.D.2
Liu, J.3
Vikram, K.4
Askarov, A.5
Myers, A.C.6
-
4
-
-
0003400251
-
-
Technical Report MTR-2547, MITRE Corp., Bedford, MA
-
D. E. Bell and L. J. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
6
-
-
84888341014
-
Toward Taming Privilege-Escalation Attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Toward Taming Privilege-Escalation Attacks on Android. In Proceedings of Network and Distributed System Security Symposium, 2012.
-
Proceedings of Network and Distributed System Security Symposium, 2012
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
8
-
-
0023241099
-
Compartimented Mode Workstation: Results Through Prototyping
-
IEEE
-
P. T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, J. Picciotto, J. P. Woodward, and J. Wynn. Compartimented Mode Workstation: Results Through Prototyping. In In the IEEE Symposium on Security and Privacy. IEEE, 1987.
-
(1987)
In the IEEE Symposium on Security and Privacy
-
-
Cummings, P.T.1
Fullam, D.A.2
Goldstein, M.J.3
Gosselin, M.J.4
Picciotto, J.5
Woodward, J.P.6
Wynn, J.7
-
10
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D. E. Denning. A Lattice Model of Secure Information Flow. Comm. of the ACM, 19(5):236-243, May 1976.
-
(1976)
Comm. Of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
11
-
-
85066347237
-
Quire: Lightweight Provenance for Smart Phone Operating Systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
Proceedings of the 20th USENIX Security Symposium, August 2011
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
12
-
-
84889060384
-
-
E and CapDesk. http://www.combex.com/tech/edesk.html.
-
E and CapDesk
-
-
-
13
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2010.
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
17
-
-
84865024594
-
Android Permissions: User Attention, Comprehension and Behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions: User Attention, Comprehension and Behavior. In Proceedings of the Symposium on Usable Privacy and Security, 2012.
-
Proceedings of the Symposium on Usable Privacy and Security, 2012
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
18
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of USENIX Security Symposium, 2011.
-
Proceedings of USENIX Security Symposium, 2011
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
21
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011.
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
23
-
-
84862068410
-
Tag, You Can See It! Using Tags for Access Control in Photo Sharing
-
P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Baur, L. F. Cranor, N. Gupta, and M. K. Reiter. Tag, You Can See It! Using Tags for Access Control in Photo Sharing. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2012.
-
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2012
-
-
Klemperer, P.F.1
Liang, Y.2
Mazurek, M.L.3
Sleeper, M.4
Ur, B.5
Baur, L.6
Cranor, L.F.7
Gupta, N.8
Reiter, M.K.9
-
25
-
-
47149101814
-
Information Flow Control for Standard OS Abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In Proceedings of ACM Symposium on Operating Systems Principles, 2007.
-
Proceedings of ACM Symposium on Operating Systems Principles, 2007
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
26
-
-
72549083642
-
Fabric: A Platform for Secure Distributed Computation and Storage
-
J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye, and A. C. Myers. Fabric: A Platform for Secure Distributed Computation and Storage. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2009.
-
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2009
-
-
Liu, J.1
George, M.D.2
Vikram, K.3
Qi, X.4
Waye, L.5
Myers, A.C.6
-
28
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In Proceedings of ASIACCS, 2010.
-
Proceedings of ASIACCS, 2010
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
32
-
-
84874840847
-
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2012.
-
Proceedings of the IEEE Symposium on Security and Privacy, 2012
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
33
-
-
70450227330
-
Laminar: Practical Fine-Grained Decentralized Information Flow Control
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical Fine-Grained Decentralized Information Flow Control. In Proc. of the Conference on Programming Language Design and Implementation, 2009.
-
Proc. Of the Conference on Programming Language Design and Implementation, 2009
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
-
37
-
-
84889034552
-
CleanOS: Limiting Mobile Data Exposiure with Idle Eviction
-
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting Mobile Data Exposiure with Idle Eviction. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012.
-
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
41
-
-
37049002830
-
Labels and Event Processes in the Asbestos Operating System
-
December
-
S. Vandebogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazières. Labels and Event Processes in the Asbestos Operating System. ACM Transactions on Computer Systems (TOCS), 25(4), December 2007.
-
(2007)
ACM Transactions on Computer Systems (TOCS)
, vol.25
, Issue.4
-
-
Vandebogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
43
-
-
77954608267
-
The Multi-Principle OS Construction of the Gazelle Web Browser
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The Multi-Principle OS Construction of the Gazelle Web Browser. In Proceedings of the USENIX Security Symposium, 2009.
-
Proceedings of the USENIX Security Symposium, 2009
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
44
-
-
84889022715
-
-
Company Overview of Liquid Machines, Inc.
-
B. Week. Company Overview of Liquid Machines, Inc. http://investing. businessweek.com/research/stocks/private/snapshot.asp?privcapId=3079632.
-
B. Week
-
-
-
45
-
-
21644436375
-
PACL's: An Access Control List Approach to Anti-viral Security
-
D. Wichers, D. Cook, R. Olsson, J. Crossley, P. Kerchen, K. Levitt, and R. Lo. PACL's: An Access Control List Approach to Anti-viral Security. In Proceedings of the 13th National Computer Security Conference, 1990.
-
Proceedings of the 13th National Computer Security Conference, 1990
-
-
Wichers, D.1
Cook, D.2
Olsson, R.3
Crossley, J.4
Kerchen, P.5
Levitt, K.6
Lo, R.7
-
47
-
-
84888352157
-
Making Information Flow Explicit in HiStar
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making Information Flow Explicit in HiStar. In Proceedings of the 7th symposium on Operating Systems Design and Implementation (OSDI), pages 263-278, 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|