Sciweavers

571 search results - page 44 / 115
» From Control Flow to Dataflow
Sort
View
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 8 months ago
Complexity of Data Flow Analysis for Non-Separable Frameworks
The complexity of round robin iterative data flow analysis has been traditionally defined as 1+d where d is the depth of a control flow graph. However, this bound is restricted to ...
Bageshri Karkare, Uday P. Khedker
PLDI
2009
ACM
14 years 1 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
14 years 3 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood
CSFW
2004
IEEE
14 years 15 days ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
ESOP
2010
Springer
14 years 6 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh