Design and verification of secure systems

JM Rushby - ACM SIGOPS Operating Systems Review, 1981 - dl.acm.org
This paper reviews some of the difficulties that arise in the verification of kernelized secure
systems and suggests new techniques for their resolution. It is proposed that secure systems …

Formal models for computer security

CE Landwehr - ACM Computing Surveys (CSUR), 1981 - dl.acm.org
Efforts to build" secure" computer systems have now been underway for more than a
decade. Many designs have been proposed, some prototypes have been constructed, and a …

Aff-wild: valence and arousal'In-the-Wild'challenge

S Zafeiriou, D Kollias, MA Nicolaou… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Ethainter: a smart contract security analyzer for composite vulnerabilities

L Brent, N Grech, S Lagouvardos, B Scholz… - Proceedings of the 41st …, 2020 - dl.acm.org
Smart contracts on permissionless blockchains are exposed to inherent security risks due to
interactions with untrusted entities. Static analyzers are essential for identifying security risks …

Program slicing

M Weiser - IEEE Transactions on software engineering, 1984 - ieeexplore.ieee.org
Program slicing is a method for automatically decomposing programs by analyzing their
data flow and control flow. Starting from a subset of a program's behavior, slicing reduces …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[PDF][PDF] Cryptography and Data Security

DE Denning - 1982 - calhoun.nps.edu
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to
prolific practical data processing systems in the 1980s. As we have come to rely on these …

JFlow: Practical mostly-static information flow control

AC Myers - Proceedings of the 26th ACM SIGPLAN-SIGACT …, 1999 - dl.acm.org
A promising technique for protecting privacy and integrity of sensitive data is to statically
check information flow within programs that manipulate the data. While previous work has …

A sound type system for secure flow analysis

D Volpano, C Irvine, G Smith - Journal of computer security, 1996 - content.iospress.com
Ensuring secure information flow within programs in the context of multiple sensitivity levels
has been widely studied. Especially noteworthy is Denning's work in secure flow analysis …