Author:
Hedin Daniel,Sjösten Alexander,Piessens Frank,Sabelfeld Andrei
Publisher
Springer Berlin Heidelberg
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gaining trust by tracing security protocols;Journal of Logical and Algebraic Methods in Programming;2023-01
2. Detecting violations of access control and information flow policies in data flow diagrams;Journal of Systems and Software;2022-02
3. Supply-Chain Vulnerability Elimination via Active Learning and Regeneration;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
4. HyperGI: Automated Detection and Repair of Information Flow Leakage;2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE);2021-11
5. Platform-Independent Dynamic Taint Analysis for JavaScript;IEEE Transactions on Software Engineering;2020-12-01