On flow-sensitive security types
From MaRDI portal
Publication:5348914
DOI10.1145/1111037.1111045zbMath1370.68053OpenAlexW2149465027MaRDI QIDQ5348914
Publication date: 21 August 2017
Published in: Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)
Full work available at URL: https://openaccess.city.ac.uk/id/eprint/194/2/floatingX.pdf
Semantics in the theory of computing (68Q55) Specification and verification (program logics, model checking, etc.) (68Q60) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items
Taming Message-Passing Communication in Compositional Reasoning About Confidentiality ⋮ Instruction-level security analysis for information flow in stack-based assembly languages ⋮ Type systems equivalent to data-flow analyses for imperative languages ⋮ Unnamed Item ⋮ On the security and safety of AbU systems ⋮ Sound symbolic execution via abstract interpretation and its application to security ⋮ Output-sensitive information flow analysis ⋮ Survey on JavaScript security policies and their enforcement mechanisms in a web browser ⋮ Integration of a security type system into a program logic ⋮ Agda formalization of a security-preserving translation from flow-sensitive to flow-insensitive security types ⋮ From Exponential to Polynomial-Time Security Typing via Principal Types ⋮ Optimality and condensing of information flow through linear refinement ⋮ Controlling file access with types ⋮ Program and proof optimizations with type systems ⋮ A survey of challenges for runtime verification from advanced application domains (beyond software) ⋮ Relational bytecode correlations ⋮ Abstract Certification of Global Non-interference in Rewriting Logic ⋮ Relational Decomposition ⋮ Abstract Interpretation of Symbolic Execution with Explicit State Updates