Precise, dynamic information flow for database-backed applications

J Yang, T Hance, TH Austin, A Solar-Lezama… - ACM Sigplan …, 2016 - dl.acm.org
We present an approach for dynamic information flow control across the application and
database. Our approach reduces the amount of policy code required, yields formal …

Multi-tier functional reactive programming for the web

B Reynders, D Devriese, F Piessens - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
The development of robust and efficient interactive web applications is challenging, because
developers have to deal with multiple programming languages, asynchronous events …

Liquid information flow control

N Polikarpova, D Stefan, J Yang, S Itzhaky… - Proceedings of the …, 2020 - dl.acm.org
We present Lifty, a domain-specific language for data-centric applications that manipulate
sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative …

Derailer: interactive security analysis for web applications

JP Near, D Jackson - Proceedings of the 29th ACM/IEEE international …, 2014 - dl.acm.org
Derailer is an interactive tool for finding security bugs in web applications. Using symbolic
execution, it enumerates the ways in which application data might be exposed. The user is …

Stellar: A programming model for developing protocol-compliant agents

A Günay, AK Chopra - Engineering Multi-Agent Systems: 6th International …, 2019 - Springer
An interaction protocol captures the rules of encounter in a multiagent system. Development
of agents that comply with protocols is a central challenge of multiagent systems. Our …

Interacto: A Modern User Interaction Processing Model

A Blouin, JM Jézéquel - IEEE Transactions on Software …, 2021 - ieeexplore.ieee.org
Since most software systems provide their users with interactive features, building user
interfaces (UI) is one of the core software engineering tasks. It consists in designing …

Engineering web applications using real-time collaborative modeling

P de Lange, P Nicolaescu, R Klamma… - … and Technology: 23rd …, 2017 - Springer
In agile practices, near real-time collaboration on the Web facilitates stakeholder activities,
their communication and joint impact analysis. In providing an abstraction layer on the …

DEv-PROMELA: an extension of PROMELA for the modelling, simulation and verification of discrete-event systems

A Yacoub, MEA Hamri, C Frydman… - … of Simulation and …, 2017 - inderscienceonline.com
PROMELA is a well-known formalism for the modelling and the verification of concurrent
systems. PROMELA deals with high-level specifications. As a result, PROMELA models are …

[PDF][PDF] End-to-end policy-agnostic security for database-backed applications

J Yang, T Hance, TH Austin… - CoRR, abs …, 2015 - researchgate.net
Protecting sensitive data often requires implementing repeated security checks and filters
throughout a program. This task is especially error-prone in web programs, where data flows …

[PDF][PDF] Type-driven repair for information flow security

N Polikarpova, J Yang, S Itzhaky… - CoRR abs …, 2016 - people.csail.mit.edu
We present LIFTY, a language that uses type-driven program repair to enforce information
flow policies. In LIFTY, the programmer specifies a policy by annotating the source of …