Sciweavers

133 search results - page 8 / 27
» Inference of Session Types From Control Flow
Sort
View
CSFW
2005
IEEE
15 years 8 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
PLDI
2009
ACM
15 years 9 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
112
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 6 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
PADL
2011
Springer
14 years 5 months ago
Joinads: A Retargetable Control-Flow Construct for Reactive, Parallel and Concurrent Programming
Modern challenges led to a design of a wide range of programming models for reactive, parallel and concurrent programming, but these are often t to encode in general purpose langua...
Tomas Petricek, Don Syme
MASCOTS
2001
15 years 3 months ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta