-
2
-
-
35048839749
-
Information flow analysis in logical form
-
R. Giacobazzi, editor, Springer-Verlag
-
T. Amtoft and A. Banerjee. Information flow analysis in logical form. In R. Giacobazzi, editor, SAS 2004, volume 3148 of LNCS, pages 100–115. Springer-Verlag, 2004.
-
(2004)
SAS 2004, Volume 3148 of LNCS
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
3
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In IEEE Symposium on Security and Privacy, pages 387–401, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
4
-
-
85166275153
-
Protecting browsers from extension vulnerabilities
-
San Diego, CA, February
-
A. Barth, A. P. Felt, P. Saxena, and A. Boodman. Protecting browsers from extension vulnerabilities. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)
-
-
Barth, A.1
Felt, A.P.2
Saxena, P.3
Boodman, A.4
-
5
-
-
80054992065
-
Extensibility, safety and performance in the spin operating system
-
December
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proceedings of the 1995 Symposium on Operating Systems Principles, pages 267–283, December 1995.
-
(1995)
Proceedings of the 1995 Symposium on Operating Systems Principles
, pp. 267-283
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
7
-
-
67650844248
-
Staged information flow for JavaScript
-
M. Hind and A. Diwan, editors, ACM
-
R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged information flow for JavaScript. In M. Hind and A. Diwan, editors, PLDI, pages 50–62. ACM, 2009.
-
(2009)
PLDI
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
10
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
New York, NY, USA, ACM
-
D. R. Engler, M. F. Kaashoek, and J. O’Toole, Jr. Exokernel: an operating system architecture for application-level resource management. In SOSP ’95: Proceedings of the fifteenth ACM symposium on Operating systems principles, pages 251–266, New York, NY, USA, 1995. ACM.
-
(1995)
SOSP ’95: Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles
, pp. 251-266
-
-
Engler, D.R.1
Kaashoek, M.F.2
O’Toole, J.3
-
11
-
-
78651539599
-
XFI: Software guards for system address spaces
-
USENIX Association
-
Ú. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, pages 75–88. USENIX Association, 2006.
-
(2006)
OSDI
, pp. 75-88
-
-
Erlingsson, Ú.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
14
-
-
85084162735
-
A secure environment for untrusted helper applications
-
July
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications. In Proceedings of the 1996 USENIX Security Symposium, pages 1–13, July 1996.
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
, pp. 1-13
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
16
-
-
77954608267
-
The multi-principal OS construction of the Gazelle web browser
-
C. Grier, H. J. Wang, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In Proceedings of the 2009 Usenix Security Symposium, 2009.
-
(2009)
Proceedings of the 2009 Usenix Security Symposium
-
-
Grier, C.1
Wang, H.J.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
17
-
-
84890883068
-
Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code
-
S. Guarnieri and B. Livshits. Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code. In Proceedings of USENIX Security’09, pages 151–168, 2009.
-
(2009)
Proceedings of USENIX Security’09
, pp. 151-168
-
-
Guarnieri, S.1
Livshits, B.2
-
19
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA, ACM
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW, pages 40–52, New York, NY, USA, 2004. ACM.
-
(2004)
WWW
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
22
-
-
58549099340
-
JavaScript instrumentation in practice
-
Berlin, Heidelberg, Springer-Verlag
-
H. Kikuchi, D. Yu, A. Chander, H. Inamura, and I. Serikov. JavaScript instrumentation in practice. In APLAS’08, pages 326–341, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
APLAS’08
, pp. 326-341
-
-
Kikuchi, H.1
Yu, D.2
Chander, A.3
Inamura, H.4
Serikov, I.5
-
24
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
Berkeley, CA, USA, USENIX Association
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In SSYM’05: Proceedings of the 14th conference on USENIX Security Symposium, pages 18–18, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SSYM’05: Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 18
-
-
Livshits, V.B.1
Lam, M.S.2
-
25
-
-
37849006886
-
Extensible web browser security
-
B. M. Hämmerli and R. Sommer, editors, Springer
-
M. T. Louw, J. S. Lim, and V. N. Venkatakrishnan. Extensible web browser security. In B. M. Hämmerli and R. Sommer, editors, DIMVA, volume 4579 of Lecture Notes in Computer Science, pages 1–19. Springer, 2007.
-
(2007)
DIMVA, Volume 4579 of Lecture Notes in Computer Science
, pp. 1-19
-
-
Louw, M.T.1
Lim, J.S.2
Venkatakrishnan, V.N.3
-
26
-
-
14944340027
-
Identifying cross site scripting vulnerabilities in web applications
-
Washington, DC, USA, IEEE Computer Society
-
G. A. D. Lucca, A. R. Fasolino, M. Mastoianni, and P. Tramontana. Identifying cross site scripting vulnerabilities in web applications. In WSE’04, pages 71–80, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
WSE’04
, pp. 71-80
-
-
Lucca, G.A.D.1
Fasolino, A.R.2
Mastoianni, M.3
Tramontana, P.4
-
27
-
-
58549113236
-
An operational semantics for JavaScript
-
G. Ramalingam, editor, Springer
-
S. Maffeis, J. C. Mitchell, and A. Taly. An operational semantics for JavaScript. In G. Ramalingam, editor, APLAS, volume 5356 of Lecture Notes in Computer Science, pages 307–325. Springer, 2008.
-
(2008)
APLAS, Volume 5356 of Lecture Notes in Computer Science
, pp. 307-325
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
28
-
-
70350525212
-
Language-based isolation of untrusted Javascript
-
IEEE, also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009
-
S. Maffeis and A. Taly. Language-based isolation of untrusted Javascript. In Proc. of CSF’09, IEEE, 2009. See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009.
-
(2009)
Proc. Of CSF’09
-
-
Maffeis, S.1
Taly, A.2
-
29
-
-
0030685617
-
Proof-carrying code
-
New York, NY, USA, ACM
-
G. C. Necula. Proof-carrying code. In POPL ’97: Proceedings of the 24th ACM SIGPLANSIGACT symposium on Principles of programming languages, pages 106–119, New York, NY, USA, 1997. ACM.
-
(1997)
POPL ’97: Proceedings of the 24th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages
, pp. 106-119
-
-
Necula, G.C.1
-
30
-
-
77955220343
-
A symbolic execution framework for JavaScript
-
P. Saxena, D. Akhawe, S. Hanna, S. McCamant, F. Mao, and D. Song. A symbolic execution framework for JavaScript. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
McCamant, S.4
Mao, F.5
Song, D.6
-
31
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, pages 213–227, 1996.
-
(1996)
OSDI
, pp. 213-227
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
32
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
The Internet Society
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS. The Internet Society, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
35
-
-
33846497980
-
Javascript instrumentation for browser security
-
M. Hofmann and M. Felleisen, editors, ACM
-
D. Yu, A. Chander, N. Islam, and I. Serikov. Javascript instrumentation for browser security. In M. Hofmann and M. Felleisen, editors, POPL, pages 237–249. ACM, 2007.
-
(2007)
POPL
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
-
36
-
-
84908296347
-
SafeDrive: Safe and recoverable extensions using language-based techniques
-
November 6-8, Seattle, WA, USA, USENIX Association
-
F. Zhou, J. Condit, Z. R. Anderson, I. Bagrak, R. Ennals, M. Harren, G. C. Necula, and E. A. Brewer. SafeDrive: Safe and recoverable extensions using language-based techniques. In 7th Symposium on Operating Systems Design and Implementation (OSDI’06), November 6-8, Seattle, WA, USA, pages 45–60. USENIX Association, 2006.
-
(2006)
7th Symposium on Operating Systems Design and Implementation (OSDI’06)
, pp. 45-60
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.R.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.C.7
Brewer, E.A.8
|