A verified information-flow architecture
A Azevedo de Amorim, N Collins, A DeHon… - Proceedings of the 41st …, 2014 - dl.acm.org
SAFE is a clean-slate design for a highly secure computer system, with pervasive
mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …
mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …
Inlined information flow monitoring for JavaScript
A Chudnov, DA Naumann - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Extant security mechanisms for web apps, notably the" same-origin policy", are not sufficient
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …
A taxonomy of information flow monitors
We propose a rigorous comparison of information flow monitors with respect to two
dimensions: soundness and transparency. For soundness, we notice that the standard …
dimensions: soundness and transparency. For soundness, we notice that the standard …
Information-flow security for JavaScript and its APIs
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …
web applications combine services from different providers. The script inclusion mechanism …
Multiple facets for dynamic information flow with exceptions
TH Austin, T Schmitz, C Flanagan - ACM Transactions on Programming …, 2017 - dl.acm.org
JavaScript is the source of many security problems, including cross-site scripting attacks and
malicious advertising code. Central to these problems is the fact that code from untrusted …
malicious advertising code. Central to these problems is the fact that code from untrusted …
On dynamic flow-sensitive floating-label systems
Flow-sensitive analysis for information-flow control (IFC) allows data structures to have
mutable security labels, ie, labels that can change over the course of the computation. This …
mutable security labels, ie, labels that can change over the course of the computation. This …
Testing noninterference, quickly
C Hriţcu, L Lampropoulos… - Journal of Functional …, 2016 - cambridge.org
Information-flow control mechanisms are difficult both to design and to prove correct. To
reduce the time wasted on doomed proof attempts due to broken definitions, we advocate …
reduce the time wasted on doomed proof attempts due to broken definitions, we advocate …
A better facet of dynamic information flow control
Multiple Facets (MF) is a dynamic enforcement mechanism which has proved to be a good fit
for implementing information flow security for JavaScript. It relies on multi executing the …
for implementing information flow security for JavaScript. It relies on multi executing the …
A verified information-flow architecture
A Azevedo de Amorim, N Collins… - Journal of computer …, 2016 - content.iospress.com
SAFE is a clean-slate design for a highly secure computer system, with pervasive
mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …
mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …
Using precise taint tracking for auto-sanitization
T Saoji, TH Austin, C Flanagan - Proceedings of the 2017 Workshop on …, 2017 - dl.acm.org
Taint analysis has been used in numerous scripting languages such as Perl and Ruby to
defend against various form of code injection attacks, such as cross-site scripting (XSS) and …
defend against various form of code injection attacks, such as cross-site scripting (XSS) and …