-
1
-
-
85076218836
-
-
http://gallium.inria.fr/~dargaye/mlcompcert.html.
-
-
-
-
4
-
-
85076204939
-
-
Pwn2own. http://en.wikipedia.org/wiki/Pwn2Own.
-
-
-
-
5
-
-
77957587422
-
Towards a formal foundation of web security
-
July M. Backes and A. Myers, Eds., IEEE Computer Society
-
AKHAWE, D., BARTH, A., LAMY, P. E., MITCHELL, J., AND SONG, D. Towards a formal foundation of web security. In Proceedings of CSF 2010 (July 2010), M. Backes and A. Myers, Eds., IEEE Computer Society, pp. 290–304.
-
(2010)
Proceedings of CSF 2010
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lamy, P.E.3
Mitchell, J.4
Song, D.5
-
6
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
ANSEL, J., MARCHENKO, P., ERLINGSSON, Ú., TAYLOR, E., CHEN, B., SCHUFF, D. L., SEHR, D., BIFFLE, C., AND YEE, B. Language-independent sandboxing of just-in-time compilation and self-modifying code. In PLDI (2011), pp. 355–366.
-
(2011)
PLDI
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, Ú.3
Taylor, E.4
Chen, B.5
Schuff, D.L.6
Sehr, D.7
Biffle, C.8
Yee, B.9
-
7
-
-
18844368270
-
Automatic predicate abstraction of C programs
-
Snowbird, Utah, June
-
BALL, T., MAJUMDAR, R., MILLSTEIN, T., AND RAJAMANI, S. K. Automatic predicate abstraction of C programs. In Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation (Snowbird, Utah, June 2001).
-
(2001)
Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.K.4
-
8
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
BARTH, A., JACKSON, C., AND MITCHELL, J. C. Robust defenses for cross-site request forgery. In ACM Conference on Computer and Communications Security (2008), pp. 75–88.
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
10
-
-
70349120464
-
-
THE GOOGLE CHROME TEAM. Tech. rep., Google
-
BARTH, A., JACKSON, C., REIS, C., AND THE GOOGLE CHROME TEAM. The security architecture of the Chromium browser. Tech. rep., Google, 2008.
-
(2008)
The Security Architecture of the Chromium Browser
-
-
Barth, A.1
Jackson, C.2
Reis, C.3
-
11
-
-
74049102285
-
Reactive noninterference
-
BOHANNON, A., PIERCE, B. C., SJÖBERG, V., WEIRICH, S., AND ZDANCEWIC, S. Reactive noninterference. In Proceedings of the 16th ACM conference on Computer and communications security (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
12
-
-
80755144024
-
App isolation: Get the security of multiple browsers with just one
-
CHEN, E. Y., BAU, J., REIS, C., BARTH, A., AND JACKSON, C. App isolation: get the security of multiple browsers with just one. In Proceedings of the 18th ACM conference on Computer and communications security (2011).
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
-
-
Chen, E.Y.1
Bau, J.2
Reis, C.3
Barth, A.4
Jackson, C.5
-
13
-
-
34548780878
-
A systematic approach to uncover security flaws in GUI logic
-
CHEN, S., MESEGUER, J., SASSE, R., WANG, H. J., AND MIN WANG, Y. A systematic approach to uncover security flaws in GUI logic. In IEEE Symposium on Security and Privacy (2007).
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Chen, S.1
Meseguer, J.2
Sasse, R.3
Wang, H.J.4
Min Wang, Y.5
-
14
-
-
70450253203
-
Staged information flow for javascript
-
CHUGH, R., MEISTER, J. A., JHALA, R., AND LERNER, S. Staged information flow for javascript. In PLDI (2009).
-
(2009)
PLDI
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
16
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
DAS, M., LERNER, S., AND SEIGLE, M. ESP: Path-sensitive program verification in polynomial time. In PLDI (2002).
-
(2002)
PLDI
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
18
-
-
0036041563
-
Lazy abstraction
-
HENZINGER, T. A., JHALA, R., MAJUMDAR, R., AND SUTRE, G. Lazy abstraction. In POPL (2002).
-
(2002)
POPL
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
19
-
-
84856138620
-
Mashupos: Operating system abstractions for client mashups
-
HOWELL, J., JACKSON, C., WANG, H. J., AND FAN, X. MashupOS: operating system abstractions for client mashups. In HotOS (2007).
-
(2007)
HotOS
-
-
Howell, J.1
Jackson, C.2
Wang, H.J.3
Fan, X.4
-
20
-
-
78649985217
-
Protecting browsers from cross-origin css attacks
-
HUANG, L.-S., WEINBERG, Z., EVANS, C., AND JACKSON, C. Protecting browsers from cross-origin css attacks. In ACM Conference on Computer and Communications Security (2010), pp. 619–629.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 619-629
-
-
Huang, L.-S.1
Weinberg, Z.2
Evans, C.3
Jackson, C.4
-
22
-
-
48349084659
-
Protecting browsers from dns rebinding attacks
-
JACKSON, C., BARTH, A., BORTZ, A., SHAO, W., AND BONEH, D. Protecting browsers from dns rebinding attacks. In ACM Conference on Computer and Communications Security (2007), pp. 421–431.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 421-431
-
-
Jackson, C.1
Barth, A.2
Bortz, A.3
Shao, W.4
Boneh, D.5
-
23
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript Web applications
-
JANG, D., JHALA, R., LERNER, S., AND SHACHAM, H. An empirical study of privacy-violating information flows in JavaScript Web applications. In Proceedings of the ACM Conference Computer and Communications Security (CCS) (2010).
-
(2010)
Proceedings of the ACM Conference Computer and Communications Security (CCS)
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
24
-
-
85076208535
-
-
Tech. rep., UC San Diego
-
JANG, D., TATLOCK, Z., AND LERNER, S. Establishing browser security guarantees through formal shim verification. Tech. rep., UC San Diego, 2012.
-
(2012)
Establishing Browser Security Guarantees through Formal Shim Verification
-
-
Jang, D.1
Tatlock, Z.2
Lerner, S.3
-
25
-
-
85076204752
-
Analyzing the cross-domain policies of flash applications
-
In May
-
JANG, D., VENKATARAMAN, A., SAWKA, G. M., AND SHACHAM, H. Analyzing the cross-domain policies of flash applications. In In Web 2.0 Security and Privacy (W2SP 2011) (May 2011).
-
(2011)
Web 2.0 Security and Privacy (W2SP 2011)
-
-
Jang, D.1
Venkataraman, A.2
Sawka, G.M.3
Shacham, H.4
-
26
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
JIM, T., SWAMY, N., AND HICKS, M. Defeating script injection attacks with browser-enforced embedded policies. In WWW (2007), pp. 601–610.
-
(2007)
WWW
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
27
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: formal verification of an OS kernel. In SOSP (2009).
-
(2009)
SOSP
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
28
-
-
85076198773
-
Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
-
LEROY, X. Formal certification of a compiler back-end, or: programming a compiler with a proof assistant. In PLDI (2006).
-
(2006)
PLDI
-
-
Leroy, X.1
-
29
-
-
77950884592
-
Toward a verified relational database management system
-
MALECHA, G., MORRISETT, G., SHINNAR, A., AND WISNESKY, R. Toward a verified relational database management system. In POPL (2010).
-
(2010)
POPL
-
-
Malecha, G.1
Morrisett, G.2
Shinnar, A.3
Wisnesky, R.4
-
30
-
-
77956608097
-
Trace-based verification of imperative programs with I/O
-
February
-
MALECHA, G., MORRISETT, G., AND WISNESKY, R. Trace-based verification of imperative programs with I/O. J. Symb. Comput. 46 (February 2011), 95–118.
-
(2011)
J. Symb. Comput.
, vol.46
, pp. 95-118
-
-
Malecha, G.1
Morrisett, G.2
Wisnesky, R.3
-
31
-
-
82655162790
-
Atlantis: Robust, extensible execution environments for web applications
-
MICKENS, J., AND DHAWAN, M. Atlantis: robust, extensible execution environments for web applications. In SOSP (2011), pp. 217–231.
-
(2011)
SOSP
, pp. 217-231
-
-
Mickens, J.1
Dhawan, M.2
-
32
-
-
84863454556
-
Rocksalt: Better, faster, stronger sfi for the x86
-
MORRISETT, G., TAN, G., TASSAROTTI, J., TRISTAN, J.-B., AND GAN, E. Rocksalt: Better, faster, stronger sfi for the x86. In PLDI (2012).
-
(2012)
PLDI
-
-
Morrisett, G.1
Tan, G.2
Tassarotti, J.3
Tristan, J.-B.4
Gan, E.5
-
33
-
-
34247236249
-
Polymorphism and separation in Hoare type theory
-
NANEVSKI, A., MORRISETT, G., AND BIRKEDAL, L. Polymorphism and separation in Hoare type theory. In ICFP (2006).
-
(2006)
ICFP
-
-
Nanevski, A.1
Morrisett, G.2
Birkedal, L.3
-
34
-
-
59249093515
-
YNOT: Dependent types for imperative programs
-
NANEVSKI, A., MORRISETT, G., SHINNAR, A., GOVEREAU, P., AND BIRKEDAL, L. Ynot: Dependent types for imperative programs. In ICFP (2008).
-
(2008)
ICFP
-
-
Nanevski, A.1
Morrisett, G.2
Shinnar, A.3
Govereau, P.4
Birkedal, L.5
-
35
-
-
85048404745
-
Preventing privilege escalation
-
USENIX Association
-
PROVOS, N., FRIEDL, M., AND HONEYMAN, P. Preventing privilege escalation. In Proceedings of the 12th conference on USENIX Security Symposium - Volume 12 (2003), USENIX Association.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
36
-
-
84924734121
-
Nozzle: A defense against heap-spraying code injection attacks
-
RATANAWORABHAN, P., LIVSHITS, V. B., AND ZORN, B. G. Nozzle: A defense against heap-spraying code injection attacks. In USENIX Security Symposium (2009), pp. 169–186.
-
(2009)
USENIX Security Symposium
, pp. 169-186
-
-
Ratanaworabhan, P.1
Livshits, V.B.2
Zorn, B.G.3
-
38
-
-
77955220343
-
A symbolic execution framework for javascript
-
SAXENA, P., AKHAWE, D., HANNA, S., MAO, F., MCCAMANT, S., AND SONG, D. A symbolic execution framework for javascript. In IEEE Symposium on Security and Privacy (2010), pp. 513–528.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 513-528
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
39
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
SINGH, K., MOSHCHUK, A., WANG, H. J., AND LEE, W. On the incoherencies in web browser access control policies. In IEEE Symposium on Security and Privacy (2010), pp. 463–478.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 463-478
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.J.3
Lee, W.4
-
40
-
-
77954584716
-
Reining in the web with content security policy
-
WWW’10
-
STAMM, S., STERNE, B., AND MARKHAM, G. Reining in the web with content security policy. In Proceedings of the 19th international conference on World wide web (2010), WWW’10, pp. 921–930.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web
, pp. 921-930
-
-
Stamm, S.1
Sterne, B.2
Markham, G.3
-
41
-
-
85076894667
-
Trust and protection in the Illinois browser operating system
-
TANG, S., MAI, H., AND KING, S. T. Trust and protection in the illinois browser operating system. In OSDI (2010), pp. 17–32.
-
(2010)
OSDI
, pp. 17-32
-
-
Tang, S.1
Mai, H.2
King, S.T.3
-
42
-
-
77955202352
-
The multi-principal OS construction of the gazelle web browser
-
WANG, H. J., GRIER, C., MOSHCHUK, A., KING, S. T., CHOUDHURY, P., AND VENTER, H. The multi-principal OS construction of the gazelle web browser. Tech. Rep. MSR-TR-2009-16, MSR, 2009.
-
(2009)
Tech. Rep. MSR-TR-2009-16
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
43
-
-
79959889388
-
Finding and understanding bugs in C compilers
-
YANG, X., CHEN, Y., EIDE, E., AND REGEHR, J. Finding and understanding bugs in C compilers. In PLDI (2011).
-
(2011)
PLDI
-
-
Yang, X.1
Chen, Y.2
Eide, E.3
Regehr, J.4
-
44
-
-
33846497980
-
Javascript instrumentation for browser security
-
YU, D., CHANDER, A., ISLAM, N., AND SERIKOV, I. Javascript instrumentation for browser security. In POPL (2007), pp. 237–249.
-
(2007)
POPL
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|