Author:
Geraldo Eduardo,Santos José Fragoso,Seco João Costa
Publisher
Springer International Publishing
Reference39 articles.
1. Agrawal, P.: Keeping your account secure. https://blog.twitter.com/official/en_us/topics/company/2018/keeping-your-account-secure.html. Accessed 15 Oct 2021
2. Lecture Notes in Computer Science;P Aldous,2015
3. Aldous, P., Might, M.: A posteriori taint-tracking for demonstrating non-interference in expressive low-level languages. In: IEEE Security and Privacy Workshops, pp. 179–184 (2016)
4. Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (2009)
5. Balliu, M., Dam, M., Guanciale, R.: Automating information flow analysis of low level code. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1080–1091 (2014)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data-Dependent Confidentiality in DCR Graphs;International Symposium on Principles and Practice of Declarative Programming;2023-10-22
2. SecWasm: Information Flow Control for WebAssembly;Static Analysis;2022