Clonedifferentiator: Analyzing clones by differentiation

Z **ng, Y Xue, S Jarzabek - 2011 26th IEEE/ACM International …, 2011 - ieeexplore.ieee.org
Clone detection provides a scalable and efficient way to detect similar code fragments. But it
offers limited explanation of differences of functions performed by clones and variations of …

Language-based missing function call detection

G Kuan, A Nogin, A Kopylov - US Patent 10,366,232, 2019 - Google Patents
Described is a language-based system for detecting function calls. The system detects
missing authorization and authentication functionality in computer software source code via …

Informative types and effects for hybrid migration control

A Almeida Matos, J Cederquist - International Conference on Runtime …, 2013 - Springer
Flow policy confinement is a property of programs whose declassifications respect the
allowed flow policy of the context in which they execute. In a distributed setting where …

Information flow in a distributed security setting

AA Matos, J Cederquist - arxiv preprint arxiv:1901.01111, 2019 - arxiv.org
Information flow security is classically formulated in terms of the absence of illegal
information flows, with respect to a security setting consisting of a single flow policy that …

Distributed noninterference

AA Matos, J Cederquist - 2014 22nd Euromicro International …, 2014 - ieeexplore.ieee.org
Noninterference is the classic information flow property that establishes the absence of
illegal information flows. Legality of flows is originally defined with respect to a single …

[PDF][PDF] Flow policy awareness for distributed information flow security

AA Matosa, J Cederquista - ist.utl.pt
In the context of distributed and mobile computing, information flow security must deal with
the decentralized nature of security policies. This issue is particularly challenging when …