Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A typed assembly language for confidentiality
D Yu, N Islam - European Symposium on Programming, 2006 - Springer
Abstract Language-based information-flow analysis is promising in protecting data
confidentiality. Although much work has been carried out in this area, relatively little has …
confidentiality. Although much work has been carried out in this area, relatively little has …
JCSI: A tool for checking secure information flow in java card applications
This paper describes a tool for checking secure information flow in Java Card applications.
The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The …
The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The …
Efficient type inference for secure information flow
This paper describes the design, analysis, and implementation of an efficient algorithm for
information flow analysis expressed using a type system. Given a program and an …
information flow analysis expressed using a type system. Given a program and an …
[PDF][PDF] Non-interference and erasure policies for java card bytecode
Non-interference is the property of a program not to leak any secret information. In this paper
we propose a notion of non-interference for an abstract version of the Java Card bytecode …
we propose a notion of non-interference for an abstract version of the Java Card bytecode …
Statically checking confidentiality via dynamic labels
This paper presents a new approach for verifying confidentiality for programs, based on
abstract interpretation. The framework is formally developed and proved correct in the …
abstract interpretation. The framework is formally developed and proved correct in the …
On practical information flow policies for Java-enabled multiapplication smart cards
D Ghindici, I Simplot-Ryl - … Conference on Smart Card Research and …, 2008 - Springer
In the multiapplicative context of smart cards, a strict control of underlying information flow
between applications is highly desired. In this paper we propose a model to improve …
between applications is highly desired. In this paper we propose a model to improve …
Formal privacy analysis of communication protocols for identity management
Over the years, formal methods have been developed for the analysis of security and privacy
aspects of communication in IT systems. However, existing methods are insufficient to deal …
aspects of communication in IT systems. However, existing methods are insufficient to deal …
Abstract certification of global non-interference in rewriting logic
Non–interference is a semantic program property that assigns confidentiality levels to data
objects and prevents illicit information flows from occurring from high to low security levels …
objects and prevents illicit information flows from occurring from high to low security levels …
[PDF][PDF] Java Bytecode Dependence Analysis for Secure Information Flow.
G Bian, K Nakayama, Y Kobayashi… - Int. J. Netw. Secur., 2007 - ijns.jalaxy.com.tw
Java programs can be transmitted and executed on another host in bytecode format, thus
the sensitive information of the host may be leaked via these assembly-like programs …
the sensitive information of the host may be leaked via these assembly-like programs …
[PDF][PDF] Language Based Security for Java and JML
ME Warnier - 2006 - repository.ubn.ru.nl
Programs contain bugs. Finding program bugs is important, especially in situations where
safety and security of a program is required. This thesis proposes a number of analysis …
safety and security of a program is required. This thesis proposes a number of analysis …