Ownership types: A survey

D Clarke, J Östlund, I Sergey, T Wrigstad - Aliasing in object-oriented …, 2013 - Springer
Ownership types were devised nearly 15 years ago to provide a stronger notion of protection
to object-oriented programming languages. Rather than simply protecting the fields of an …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

Secure information flow by self-composition

G Barthe, PR D'argenio, T Rezk - Mathematical Structures in …, 2011 - cambridge.org
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …

Securing web application code by static analysis and runtime protection

YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of
transactions, especially since the recent sharp increase in remotely exploitable …

Simple relational correctness proofs for static analyses and program transformations

N Benton - ACM SIGPLAN Notices, 2004 - dl.acm.org
We show how some classical static analyses for imperative programs, and the optimizing
transformations which they enable, may be expressed and proved correct using elementary …

Observational determinism for concurrent program security

S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …

Efficient purely-dynamic information flow analysis

TH Austin, C Flanagan - Proceedings of the ACM SIGPLAN Fourth …, 2009 - dl.acm.org
We present a novel approach for efficiently tracking information flow in a dynamically-typed
language such as JavaScript. Our approach is purely dynamic, and it detects problems with …

Information flow inference for ML

F Pottier, V Simonet - ACM Transactions on Programming Languages …, 2003 - dl.acm.org
This paper presents a type-based information flow analysis for a call-by-value λ-calculus
equipped with references, exceptions and let-polymorphism, which we refer to as ML. The …

A model for delimited information release

A Sabelfeld, AC Myers - Software Security-Theories and Systems: Second …, 2004 - Springer
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …

Information flow inference for ML

F Pottier, V Simonet - Proceedings of the 29th ACM SIGPLAN-SIGACT …, 2002 - dl.acm.org
This paper presents a type-based information flow analysis for a call-by-value λ-calculus
equipped with references, exceptions and let-polymorphism, which we refer to as Core ML …