메뉴 건너뛰기




Volumn , Issue , 2012, Pages 113-128

Establishing browser security guarantees through formal shim verification

Author keywords

[No Author keywords available]

Indexed keywords

SPECIFICATIONS;

EID: 84901643478     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (47)

References (44)
  • 1
    • 85076218836 scopus 로고    scopus 로고
    • http://gallium.inria.fr/~dargaye/mlcompcert.html.
  • 4
    • 85076204939 scopus 로고    scopus 로고
    • Pwn2own. http://en.wikipedia.org/wiki/Pwn2Own.
  • 5
    • 77957587422 scopus 로고    scopus 로고
    • Towards a formal foundation of web security
    • July M. Backes and A. Myers, Eds., IEEE Computer Society
    • AKHAWE, D., BARTH, A., LAMY, P. E., MITCHELL, J., AND SONG, D. Towards a formal foundation of web security. In Proceedings of CSF 2010 (July 2010), M. Backes and A. Myers, Eds., IEEE Computer Society, pp. 290–304.
    • (2010) Proceedings of CSF 2010 , pp. 290-304
    • Akhawe, D.1    Barth, A.2    Lamy, P.E.3    Mitchell, J.4    Song, D.5
  • 16
    • 0036040604 scopus 로고    scopus 로고
    • ESP: Path-sensitive program verification in polynomial time
    • DAS, M., LERNER, S., AND SEIGLE, M. ESP: Path-sensitive program verification in polynomial time. In PLDI (2002).
    • (2002) PLDI
    • Das, M.1    Lerner, S.2    Seigle, M.3
  • 19
    • 84856138620 scopus 로고    scopus 로고
    • Mashupos: Operating system abstractions for client mashups
    • HOWELL, J., JACKSON, C., WANG, H. J., AND FAN, X. MashupOS: operating system abstractions for client mashups. In HotOS (2007).
    • (2007) HotOS
    • Howell, J.1    Jackson, C.2    Wang, H.J.3    Fan, X.4
  • 26
    • 35348860223 scopus 로고    scopus 로고
    • Defeating script injection attacks with browser-enforced embedded policies
    • JIM, T., SWAMY, N., AND HICKS, M. Defeating script injection attacks with browser-enforced embedded policies. In WWW (2007), pp. 601–610.
    • (2007) WWW , pp. 601-610
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 28
    • 85076198773 scopus 로고    scopus 로고
    • Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
    • LEROY, X. Formal certification of a compiler back-end, or: programming a compiler with a proof assistant. In PLDI (2006).
    • (2006) PLDI
    • Leroy, X.1
  • 29
    • 77950884592 scopus 로고    scopus 로고
    • Toward a verified relational database management system
    • MALECHA, G., MORRISETT, G., SHINNAR, A., AND WISNESKY, R. Toward a verified relational database management system. In POPL (2010).
    • (2010) POPL
    • Malecha, G.1    Morrisett, G.2    Shinnar, A.3    Wisnesky, R.4
  • 30
    • 77956608097 scopus 로고    scopus 로고
    • Trace-based verification of imperative programs with I/O
    • February
    • MALECHA, G., MORRISETT, G., AND WISNESKY, R. Trace-based verification of imperative programs with I/O. J. Symb. Comput. 46 (February 2011), 95–118.
    • (2011) J. Symb. Comput. , vol.46 , pp. 95-118
    • Malecha, G.1    Morrisett, G.2    Wisnesky, R.3
  • 31
    • 82655162790 scopus 로고    scopus 로고
    • Atlantis: Robust, extensible execution environments for web applications
    • MICKENS, J., AND DHAWAN, M. Atlantis: robust, extensible execution environments for web applications. In SOSP (2011), pp. 217–231.
    • (2011) SOSP , pp. 217-231
    • Mickens, J.1    Dhawan, M.2
  • 33
    • 34247236249 scopus 로고    scopus 로고
    • Polymorphism and separation in Hoare type theory
    • NANEVSKI, A., MORRISETT, G., AND BIRKEDAL, L. Polymorphism and separation in Hoare type theory. In ICFP (2006).
    • (2006) ICFP
    • Nanevski, A.1    Morrisett, G.2    Birkedal, L.3
  • 41
    • 85076894667 scopus 로고    scopus 로고
    • Trust and protection in the Illinois browser operating system
    • TANG, S., MAI, H., AND KING, S. T. Trust and protection in the illinois browser operating system. In OSDI (2010), pp. 17–32.
    • (2010) OSDI , pp. 17-32
    • Tang, S.1    Mai, H.2    King, S.T.3
  • 43
    • 79959889388 scopus 로고    scopus 로고
    • Finding and understanding bugs in C compilers
    • YANG, X., CHEN, Y., EIDE, E., AND REGEHR, J. Finding and understanding bugs in C compilers. In PLDI (2011).
    • (2011) PLDI
    • Yang, X.1    Chen, Y.2    Eide, E.3    Regehr, J.4
  • 44
    • 33846497980 scopus 로고    scopus 로고
    • Javascript instrumentation for browser security
    • YU, D., CHANDER, A., ISLAM, N., AND SERIKOV, I. Javascript instrumentation for browser security. In POPL (2007), pp. 237–249.
    • (2007) POPL , pp. 237-249
    • Yu, D.1    Chander, A.2    Islam, N.3    Serikov, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.