Deductive software verification-the key book
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …
Exploring and enforcing security guarantees via program dependence graphs
We present PIDGIN, a program analysis and understanding tool that enables the
specification and enforcement of precise application-specific information security …
specification and enforcement of precise application-specific information security …
A temporal logic approach to information-flow control
MN Rabe - 2016 - publikationen.sulb.uni-saarland.de
Information leaks and other violations of information security pose a severe threat to
individuals, companies, and even countries. The mechanisms by which attackers threaten …
individuals, companies, and even countries. The mechanisms by which attackers threaten …
Information flow analysis for javascript
Modern Web 2.0 pages combine scripts from several sources into a single client-side
JavaScript program with almost no isolation. In order to prevent attacks from an untrusted …
JavaScript program with almost no isolation. In order to prevent attacks from an untrusted …
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
Malicious users can attack Web applications by exploiting injection vulnerabilities in the
source code. This work addresses the challenge of detecting injection vulnerabilities in the …
source code. This work addresses the challenge of detecting injection vulnerabilities in the …
Security slicing for auditing common injection vulnerabilities
Cross-site scripting and injection vulnerabilities are among the most common and serious
security issues for Web applications. Although existing static analysis approaches can detect …
security issues for Web applications. Although existing static analysis approaches can detect …
Experiences with PDG-based IFC
C Hammer - Engineering Secure Software and Systems: Second …, 2010 - Springer
Abstract Information flow control systems provide the guarantees that are required in today's
security-relevant systems. While the literature has produced a wealth of techniques to …
security-relevant systems. While the literature has produced a wealth of techniques to …
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
XML, XPath, and SQL injection vulnerabilities are among the most common and serious
security issues for Web applications and Web services. Thus, it is important for security …
security issues for Web applications and Web services. Thus, it is important for security …
[ΒΙΒΛΙΟ][B] A machine-checked, type-safe model of Java concurrency: language, virtual machine, memory model, and verified compiler
A Lochbihler - 2014 - books.google.com
The Java programming language provides safety and security guarantees such as type
safety and its security architecture. They distinguish it from other mainstream programming …
safety and its security architecture. They distinguish it from other mainstream programming …
Joanaudit: A tool for auditing common injection vulnerabilities
JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and
Web services for common injection vulnerabilities during software development. It …
Web services for common injection vulnerabilities during software development. It …