Sciweavers

519 search results - page 27 / 104
» Control flow obfuscation with information flow tracking
Sort
View
LISP
2002
81views more  LISP 2002»
13 years 8 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
BPSC
2009
190views Business» more  BPSC 2009»
13 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
CVPR
2009
IEEE
15 years 4 months ago
Contextual Flow
Matching based on local brightness is quite limited, because small changes on local appearance invalidate the constancy in brightness. The root of this limitation is its treatme...
Ying Wu (Northwestern University), Jialue Fan (Nor...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 9 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober