A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality …
Information flow policies are confidentiality policies that control information leakage through program execution. A common way to enforce secure information flow is through information …
YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable …
We show how some classical static analyses for imperative programs, and the optimizing transformations which they enable, may be expressed and proved correct using elementary …
S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security policies for data confidentiality and integrity. However, extending noninterference to …
TH Austin, C Flanagan - Proceedings of the ACM SIGPLAN Fourth …, 2009 - dl.acm.org
We present a novel approach for efficiently tracking information flow in a dynamically-typed language such as JavaScript. Our approach is purely dynamic, and it detects problems with …
F Pottier, V Simonet - ACM Transactions on Programming Languages …, 2003 - dl.acm.org
This paper presents a type-based information flow analysis for a call-by-value λ-calculus equipped with references, exceptions and let-polymorphism, which we refer to as ML. The …
A Sabelfeld, AC Myers - Software Security-Theories and Systems: Second …, 2004 - Springer
Much work on security-typed languages lacks a satisfactory account of intentional information release. In the context of confidentiality, a typical security guarantee provided by …
F Pottier, V Simonet - Proceedings of the 29th ACM SIGPLAN-SIGACT …, 2002 - dl.acm.org
This paper presents a type-based information flow analysis for a call-by-value λ-calculus equipped with references, exceptions and let-polymorphism, which we refer to as Core ML …