Author:
Scull Pupo Angel Luis,Christophe Laurent,Nicolay Jens,de Roover Coen,Gonzalez Boix Elisa
Publisher
Springer International Publishing
Reference34 articles.
1. Same Origin Policy - Web Security.
https://www.w3.org/Security/wiki/Same Origin Policy
2. Man-in-the-middle attack - OWASP, August 2015.
https://www.owasp.org/index.php/Man-in-the-middle_attack
3. Andreasen, E., et al.: A survey of dynamic analysis and test generation for JavaScript. ACM Comput. Surv. 50(5), 1–36 (2017)
4. Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS, p. 113 (2009)
5. Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS, pp. 1–12 (2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamic Possible Source Count Analysis for Data Leakage Prevention;Proceedings of the 21st ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes;2024-09-13
2. Brigadier: A Datalog-based IAST framework for Node.js Applications;2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER);2023-03
3. MODINF: Exploiting Reified Computational Dependencies for Information Flow Analysis;Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering;2023
4. Permissive runtime information flow control in the presence of exceptions;Journal of Computer Security;2021-06-18