首页 > 最新文献

ACM Workshop on Programming Languages and Analysis for Security最新文献

英文 中文
Static path conditions for Java Java的静态路径条件
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375704
Christian Hammer, Rüdiger Schaade, G. Snelting
A static path condition is a precise necessary condition for information flow between two program points. Previous work defined path conditions for procedural languages. Object oriented languages offer additional constructs such as dynamic dispatch, instanceof and exceptions. In this paper, we present an analysis of these constructs, which leads to precise path conditions operating only on the program's variables. This yields a gain in precision, allowing leverage of automatic constraint solving. We present details of path condition generation for Java constructs, and discuss preliminary insight from our prototype implementation.
静态路径条件是两个程序点之间信息流的精确必要条件。以前的工作定义了过程语言的路径条件。面向对象语言提供了额外的结构,如动态分派、实例化和异常。在本文中,我们提出了这些结构的分析,导致精确的路径条件只在程序的变量上操作。这提高了精度,允许利用自动约束求解。我们详细介绍了Java构造的路径条件生成,并讨论了原型实现的初步见解。
{"title":"Static path conditions for Java","authors":"Christian Hammer, Rüdiger Schaade, G. Snelting","doi":"10.1145/1375696.1375704","DOIUrl":"https://doi.org/10.1145/1375696.1375704","url":null,"abstract":"A static path condition is a precise necessary condition for information flow between two program points. Previous work defined path conditions for procedural languages. Object oriented languages offer additional constructs such as dynamic dispatch, instanceof and exceptions. In this paper, we present an analysis of these constructs, which leads to precise path conditions operating only on the program's variables. This yields a gain in precision, allowing leverage of automatic constraint solving. We present details of path condition generation for Java constructs, and discuss preliminary insight from our prototype implementation.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Information flow security of multi-threaded distributed programs 多线程分布式程序的信息流安全
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375711
R. Focardi, Matteo Centenaro
We study noninterference in the setting of multi-threaded distributed programs in which threads share local memories and multi-threaded processes communicate over an insecure network using encryption primitives to secure messages. We extend a simple imperative language with cryptographic operations which are modelled as special expressions respecting the Dolev-Yao assumptions. Then, we adapt to our setting the notion of patterns proposed by Abadi and Rogaway for modelling the equivalence of cryptographic expressions. Based on this notion, we naturally obtain a definition of strongly secure programs corresponding to the one proposed by Sabelfeld and Sands for programs without cryptography. This is, to the best of our knowledge, the first definition of noninterference in a multi-threaded distributed setting, with insecure channels and cryptography. We prove compositionality of secure programs and we adapt the type system of Sabelfeld and Sands to our setting, proving its correctness.
我们研究了多线程分布式程序设置中的不干扰,其中线程共享本地内存,多线程进程在不安全的网络上使用加密原语来保护消息。我们扩展了一种简单的命令式语言,其中的密码操作被建模为尊重Dolev-Yao假设的特殊表达式。然后,根据我们的设置,我们采用了Abadi和Rogaway提出的模式概念来建模密码表达式的等价性。基于这个概念,我们很自然地得到了一个强安全方案的定义,对应于Sabelfeld和Sands对不使用加密的方案提出的定义。据我们所知,这是多线程分布式设置中不干扰的第一个定义,具有不安全的通道和加密。我们证明了安全程序的可组合性,并使Sabelfeld和Sands的类型系统适应于我们的设置,证明了其正确性。
{"title":"Information flow security of multi-threaded distributed programs","authors":"R. Focardi, Matteo Centenaro","doi":"10.1145/1375696.1375711","DOIUrl":"https://doi.org/10.1145/1375696.1375711","url":null,"abstract":"We study noninterference in the setting of multi-threaded distributed programs in which threads share local memories and multi-threaded processes communicate over an insecure network using encryption primitives to secure messages. We extend a simple imperative language with cryptographic operations which are modelled as special expressions respecting the Dolev-Yao assumptions. Then, we adapt to our setting the notion of patterns proposed by Abadi and Rogaway for modelling the equivalence of cryptographic expressions. Based on this notion, we naturally obtain a definition of strongly secure programs corresponding to the one proposed by Sabelfeld and Sands for programs without cryptography. This is, to the best of our knowledge, the first definition of noninterference in a multi-threaded distributed setting, with insecure channels and cryptography. We prove compositionality of secure programs and we adapt the type system of Sabelfeld and Sands to our setting, proving its correctness.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Aspect-oriented in-lined reference monitors 面向方面的内联引用监视器
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375699
Kevin W. Hamlen, Micah Jones
An Aspect-Oriented, declarative, security policy specification language is presented, for enforcement by In-lined Reference Monitors. The semantics of the language establishes a formal connection between Aspect-Oriented Programming and In-lined Reference Monitoring wherein policy specifications denote Aspect-Oriented security automata---security automata whose edge labels are encoded as pointcut expressions. The prototype language implementation enforces these security policies by automatically rewriting Java bytecode programs so as to detect and prevent policy violations at runtime.
提出了一种面向方面的声明性安全策略规范语言,由内联引用监视器执行。该语言的语义在面向方面编程和内联引用监视之间建立了正式的连接,其中策略规范表示面向方面的安全自动机——其边缘标签编码为切入点表达式的安全自动机。原型语言实现通过自动重写Java字节码程序来强制执行这些安全策略,以便在运行时检测和防止策略违反。
{"title":"Aspect-oriented in-lined reference monitors","authors":"Kevin W. Hamlen, Micah Jones","doi":"10.1145/1375696.1375699","DOIUrl":"https://doi.org/10.1145/1375696.1375699","url":null,"abstract":"An Aspect-Oriented, declarative, security policy specification language is presented, for enforcement by In-lined Reference Monitors. The semantics of the language establishes a formal connection between Aspect-Oriented Programming and In-lined Reference Monitoring wherein policy specifications denote Aspect-Oriented security automata---security automata whose edge labels are encoded as pointcut expressions. The prototype language implementation enforces these security policies by automatically rewriting Java bytecode programs so as to detect and prevent policy violations at runtime.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
A type system for data-flow integrity on windows vista 在windowsvista上实现数据流完整性的类型系统
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375708
A. Chaudhuri, P. Naldurg, S. Rajamani
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow attack. Thus, it is possible to eliminate such attacks by statically restricting trusted code. We formalize this model by designing a type system that can efficiently enforce data-flow integrity on Windows Vista. Typechecking guarantees that objects whose contents are statically trusted never contain untrusted values, regardless of what untrusted code runs in the environment. Some of Windows Vista's runtime access checks are necessary for soundness; others are redundant and can be optimized away.
Windows Vista操作系统实现了一个有趣的多级完整性模型。我们观察到,在这个模型中,受信任的代码必须参与任何信息流攻击。因此,可以通过静态限制可信代码来消除此类攻击。我们通过设计一个类型系统来形式化这个模型,该系统可以有效地在Windows Vista上执行数据流完整性。类型检查保证其内容静态可信的对象永远不会包含不可信的值,无论环境中运行的是什么不可信的代码。一些Windows Vista的运行时访问检查是必要的健全;其他的是多余的,可以被优化掉。
{"title":"A type system for data-flow integrity on windows vista","authors":"A. Chaudhuri, P. Naldurg, S. Rajamani","doi":"10.1145/1375696.1375708","DOIUrl":"https://doi.org/10.1145/1375696.1375708","url":null,"abstract":"The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow attack. Thus, it is possible to eliminate such attacks by statically restricting trusted code. We formalize this model by designing a type system that can efficiently enforce data-flow integrity on Windows Vista. Typechecking guarantees that objects whose contents are statically trusted never contain untrusted values, regardless of what untrusted code runs in the environment. Some of Windows Vista's runtime access checks are necessary for soundness; others are redundant and can be optimized away.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Verified enforcement of stateful information release policies 验证有状态信息发布策略的实施
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375700
N. Swamy, M. Hicks
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces its information release policy. Our approach has two parts. First, an information release policy is specified as a security automaton written in a new language called AIR. Second, we enforce an AIR policy by translating it into an API for programs written in LAIR, a core formalism for a functional programming language. LAIR uses a novel combination of dependent, affine, and singleton types to ensure that the API is used correctly. As a consequence we can certify that programs written in LAIR meet the requirements of the original AIR policy specification.
许多组织指定信息发布策略来描述敏感信息可能向其他组织发布的条款。本文提出了一种确保安全关键型软件正确执行其信息发布策略的新方法。我们的方法有两个部分。首先,将信息发布策略指定为用称为AIR的新语言编写的安全自动机。其次,我们通过将AIR策略转换为用LAIR编写的程序的API来强制执行AIR策略,LAIR是函数式编程语言的核心形式。LAIR使用依赖类型、仿射类型和单例类型的新颖组合来确保API被正确使用。因此,我们可以证明用LAIR编写的程序符合原始AIR策略规范的要求。
{"title":"Verified enforcement of stateful information release policies","authors":"N. Swamy, M. Hicks","doi":"10.1145/1375696.1375700","DOIUrl":"https://doi.org/10.1145/1375696.1375700","url":null,"abstract":"Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces its information release policy. Our approach has two parts. First, an information release policy is specified as a security automaton written in a new language called AIR. Second, we enforce an AIR policy by translating it into an API for programs written in LAIR, a core formalism for a functional programming language. LAIR uses a novel combination of dependent, affine, and singleton types to ensure that the API is used correctly. As a consequence we can certify that programs written in LAIR meet the requirements of the original AIR policy specification.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Dominator-tree analysis for distributed authorization 用于分布式授权的支配树分析
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375709
M. Mowbray, A. Lain
Practical analysis tools for distributed authorization need to answer quickly and accurately the question: who can access this resource? DAP (Delegation with Acyclic Paths) is a distributed authorization framework (introduced in [17]) that tries to inter-operate better with standard PKI mechanisms while retaining some of the benefits of new trust management schemes. DAP has an acyclicity requirement which makes it more difficult to answer the question quickly. In this paper we use a technique borrowed from compiler optimization, dominator-tree problem decomposition, to overcome this limitation of DAP with a fast heuristic. We show through simulation the heuristic's performance in a realistic federated resource management scenario. We also show how this heuristic can be complemented by clone-analysis techniques that exploit similarities between principals to further improve performance. We are currently using the heuristic and clone-analysis in practice in a design/analysis security tool.
用于分布式授权的实用分析工具需要快速准确地回答以下问题:谁可以访问此资源?DAP (Delegation with Acyclic Paths)是一种分布式授权框架(在[17]中引入),它试图与标准PKI机制更好地互操作,同时保留了新信任管理方案的一些好处。DAP具有非周期性要求,这使得快速回答问题变得更加困难。本文借用编译器优化中的一种技术,即支配树问题分解,通过快速的启发式方法来克服DAP的这一局限性。我们通过模拟在现实的联邦资源管理场景中展示了启发式算法的性能。我们还展示了如何利用克隆分析技术来补充这种启发式方法,克隆分析技术利用主体之间的相似性来进一步提高性能。我们目前在设计/分析安全工具中实际使用启发式和克隆分析。
{"title":"Dominator-tree analysis for distributed authorization","authors":"M. Mowbray, A. Lain","doi":"10.1145/1375696.1375709","DOIUrl":"https://doi.org/10.1145/1375696.1375709","url":null,"abstract":"Practical analysis tools for distributed authorization need to answer quickly and accurately the question: who can access this resource? DAP (Delegation with Acyclic Paths) is a distributed authorization framework (introduced in [17]) that tries to inter-operate better with standard PKI mechanisms while retaining some of the benefits of new trust management schemes. DAP has an acyclicity requirement which makes it more difficult to answer the question quickly. In this paper we use a technique borrowed from compiler optimization, dominator-tree problem decomposition, to overcome this limitation of DAP with a fast heuristic. We show through simulation the heuristic's performance in a realistic federated resource management scenario.\u0000 We also show how this heuristic can be complemented by clone-analysis techniques that exploit similarities between principals to further improve performance. We are currently using the heuristic and clone-analysis in practice in a design/analysis security tool.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulating midlet's security claims with automata modulo theory 用自动机模理论模拟midlet的安全声明
Pub Date : 2008-06-07 DOI: 10.1145/1375696.1375698
F. Massacci, I. Siahaan
Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on its security behavior that could be matched against a mobile platform policy before downloading the code. In order to capture realistic scenarios with potentially infinite transitions (e.g. "only connections to urls starting with https") we have proposed to represent those policies with the notion of Automata Modulo Theory (AMT), an extension of Buchi Automata (BA), with edges labeled by expressions in a decidable theory. Our objective is the run-time matching of the mobile's platform policy against the midlet's security claims expressed as AMT. To this extent the use of on-the-fly product and emptiness test from automata theory may not be effective. In this paper we present an algorithm extending fair simulation between Büchi automata that can be more efficiently implemented.
携带模型的代码和契约安全已经提出在下载代码之前,通过声明其安全行为来增强移动代码,从而与移动平台策略进行匹配。为了捕捉具有潜在无限转换的现实场景(例如:“仅连接到以https开头的url”),我们建议用自动机模理论(AMT)的概念来表示这些策略,AMT是Buchi自动机(BA)的扩展,其边缘用可决定理论中的表达式标记。我们的目标是在运行时将移动设备的平台策略与中间件的安全声明(表示为AMT)进行匹配。在这种程度上,使用即时产品和自动机理论的空性测试可能是无效的。本文提出了一种扩展 chi自动机之间公平模拟的算法,可以更有效地实现。
{"title":"Simulating midlet's security claims with automata modulo theory","authors":"F. Massacci, I. Siahaan","doi":"10.1145/1375696.1375698","DOIUrl":"https://doi.org/10.1145/1375696.1375698","url":null,"abstract":"Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on its security behavior that could be matched against a mobile platform policy before downloading the code. In order to capture realistic scenarios with potentially infinite transitions (e.g. \"only connections to urls starting with https\") we have proposed to represent those policies with the notion of Automata Modulo Theory (AMT), an extension of Buchi Automata (BA), with edges labeled by expressions in a decidable theory.\u0000 Our objective is the run-time matching of the mobile's platform policy against the midlet's security claims expressed as AMT. To this extent the use of on-the-fly product and emptiness test from automata theory may not be effective. In this paper we present an algorithm extending fair simulation between Büchi automata that can be more efficiently implemented.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using web application construction frameworks to protect against code injection attacks 使用web应用程序构建框架来防止代码注入攻击
Pub Date : 2007-06-14 DOI: 10.1145/1255329.1255346
B. Livshits, Ú. Erlingsson
In recent years, the security landscape has changed, with Web applications vulnerabilities becoming more prominent that vulnerabilities stemming from the lack of type safety, such as buffer overruns. Many reports point to code injection attacks such as cross-site scripting and RSS injection as being the most common attacks against Web applications to date. With Web 2.0 existing security problems are further exacerbated by the advent of Ajax technology that allows one to create and compose HTML content from different sources within the browser at runtime, as exemplified by customizable mashup pages like My Yahoo! or Live.com This paper proposes a simple to support, yet a powerful scheme for eliminating a wide range of script injection vulnerabilities in applications built on top of popular Ajax development frameworks such as the Dojo Toolkit, prototype.js, and AJAX.NET. Unlike other client-side runtime enforcement proposals, the approach we are advocating requires only minor browser modifications. This is because our proposal can be viewed as a natural finer-grained extension of the same-origin policy for JavaScript already supported by the majority of mainstream browsers, in which we treat individual user interface widgets as belonging to separate domains Fortunately, in many cases no changes to the development process need to take place: for applications that are built on top of frameworks described above, a slight framework modification will result in appropriate changes in the generated HTML, completely obviating the need for manual code annotation. In this paper we demonstrate how these changes can prevent cross-site scripting and RSS injection attacks using the Dojo Toolkit, a popular Ajax library, as an example.
近年来,安全形势发生了变化,Web应用程序漏洞变得比由于缺乏类型安全(如缓冲区溢出)而产生的漏洞更加突出。许多报告指出,代码注入攻击(如跨站点脚本和RSS注入)是迄今为止针对Web应用程序最常见的攻击。对于Web 2.0, Ajax技术的出现进一步加剧了现有的安全问题,Ajax技术允许在运行时在浏览器中从不同的源创建和组合HTML内容,如My Yahoo!本文提出了一个简单而又强大的方案,用于消除基于流行Ajax开发框架(如Dojo Toolkit、prototype.js和AJAX.NET)构建的应用程序中的大量脚本注入漏洞。与其他客户端运行时实施建议不同,我们提倡的方法只需要对浏览器进行很小的修改。这是因为我们的建议可以被看作是对大多数主流浏览器已经支持的JavaScript同源策略的自然细粒度扩展,在这种策略中,我们将单个用户界面部件视为属于单独的域,幸运的是,在许多情况下,不需要对开发过程进行更改:对于构建在上述框架之上的应用程序,对框架的轻微修改将导致生成的HTML发生适当的变化,从而完全避免了手动代码注释的需要。在本文中,我们将以Dojo Toolkit(一种流行的Ajax库)为例,演示这些更改如何防止跨站点脚本和RSS注入攻击。
{"title":"Using web application construction frameworks to protect against code injection attacks","authors":"B. Livshits, Ú. Erlingsson","doi":"10.1145/1255329.1255346","DOIUrl":"https://doi.org/10.1145/1255329.1255346","url":null,"abstract":"In recent years, the security landscape has changed, with Web applications vulnerabilities becoming more prominent that vulnerabilities stemming from the lack of type safety, such as buffer overruns. Many reports point to code injection attacks such as cross-site scripting and RSS injection as being the most common attacks against Web applications to date. With Web 2.0 existing security problems are further exacerbated by the advent of Ajax technology that allows one to create and compose HTML content from different sources within the browser at runtime, as exemplified by customizable mashup pages like My Yahoo! or Live.com\u0000 This paper proposes a simple to support, yet a powerful scheme for eliminating a wide range of script injection vulnerabilities in applications built on top of popular Ajax development frameworks such as the Dojo Toolkit, prototype.js, and AJAX.NET. Unlike other client-side runtime enforcement proposals, the approach we are advocating requires only minor browser modifications. This is because our proposal can be viewed as a natural finer-grained extension of the same-origin policy for JavaScript already supported by the majority of mainstream browsers, in which we treat individual user interface widgets as belonging to separate domains\u0000 Fortunately, in many cases no changes to the development process need to take place: for applications that are built on top of frameworks described above, a slight framework modification will result in appropriate changes in the generated HTML, completely obviating the need for manual code annotation. In this paper we demonstrate how these changes can prevent cross-site scripting and RSS injection attacks using the Dojo Toolkit, a popular Ajax library, as an example.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Informal presentation: a trust management perspective on managing policy updates in security-typed languages 非正式表示:以安全类型语言管理策略更新的信任管理视角
Pub Date : 2007-06-14 DOI: 10.1145/1255329.1255342
Sruthi Bandhakavi, W. Winsborough, M. Winslett
A fluorescent lamp operating on reduced energy consumption includes a unique mount which carries a shield providing both a getter and a mercury dispenser. The lamp has a preferable fill of 80% neon and 20% krypton at a pressure of 2.0 Torr.
一种降低能耗的荧光灯包括一个独特的支架,它带有一个既提供吸气器又提供水银分配器的屏蔽。在2.0托的压力下,灯的理想填充量为80%氖和20%氪。
{"title":"Informal presentation: a trust management perspective on managing policy updates in security-typed languages","authors":"Sruthi Bandhakavi, W. Winsborough, M. Winslett","doi":"10.1145/1255329.1255342","DOIUrl":"https://doi.org/10.1145/1255329.1255342","url":null,"abstract":"A fluorescent lamp operating on reduced energy consumption includes a unique mount which carries a shield providing both a getter and a mercury dispenser. The lamp has a preferable fill of 80% neon and 20% krypton at a pressure of 2.0 Torr.","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a logical account of declassification 对解密的逻辑解释
Pub Date : 2007-06-14 DOI: 10.1145/1255329.1255340
A. Banerjee, D. Naumann, S. Rosenberg
Declassification is a vital ingredient for practical use of secure systems. Several recent efforts to formulate an end-to-end policy for declassification seem inconclusive and have focused on apparently different aspects. (e.g., what values are involved, where in the code declassification occurs, when declassification happens and who (which principal) releases information.) In this informal paper, we argue that key security goals addressed by the proposed notions can be expressed using assertions and auxiliary state (such as event history), building on a recently developed logic for noninterference that provides for local reasoning about the heap
解密是安全系统实际使用的重要组成部分。最近几项制定端到端解密政策的努力似乎没有定论,而且侧重于明显不同的方面。(例如,涉及哪些值,在代码中解密发生的位置,何时解密发生以及谁(哪个主体)发布信息。)在这篇非正式的论文中,我们认为所提出的概念所解决的关键安全目标可以使用断言和辅助状态(如事件历史)来表达,建立在最近开发的非干扰逻辑上,该逻辑提供了关于堆的局部推理
{"title":"Towards a logical account of declassification","authors":"A. Banerjee, D. Naumann, S. Rosenberg","doi":"10.1145/1255329.1255340","DOIUrl":"https://doi.org/10.1145/1255329.1255340","url":null,"abstract":"Declassification is a vital ingredient for practical use of secure systems. Several recent efforts to formulate an end-to-end policy for declassification seem inconclusive and have focused on apparently different aspects. (e.g., what values are involved, where in the code declassification occurs, when declassification happens and who (which principal) releases information.) In this informal paper, we argue that key security goals addressed by the proposed notions can be expressed using assertions and auxiliary state (such as event history), building on a recently developed logic for noninterference that provides for local reasoning about the heap","PeriodicalId":119000,"journal":{"name":"ACM Workshop on Programming Languages and Analysis for Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
ACM Workshop on Programming Languages and Analysis for Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1