Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

Exploring and enforcing security guarantees via program dependence graphs

A Johnson, L Waye, S Moore, S Chong - ACM SIGPLAN Notices, 2015 - dl.acm.org
We present PIDGIN, a program analysis and understanding tool that enables the
specification and enforcement of precise application-specific information security …

A temporal logic approach to information-flow control

MN Rabe - 2016 - publikationen.sulb.uni-saarland.de
Information leaks and other violations of information security pose a severe threat to
individuals, companies, and even countries. The mechanisms by which attackers threaten …

Information flow analysis for javascript

S Just, A Cleary, B Shirley, C Hammer - Proceedings of the 1st ACM …, 2011 - dl.acm.org
Modern Web 2.0 pages combine scripts from several sources into a single client-side
JavaScript program with almost no isolation. In order to prevent attacks from an untrusted …

An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving

J Thome, LK Shar, D Bianculli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Malicious users can attack Web applications by exploiting injection vulnerabilities in the
source code. This work addresses the challenge of detecting injection vulnerabilities in the …

Security slicing for auditing common injection vulnerabilities

J Thomé, LK Shar, D Bianculli, L Briand - Journal of Systems and Software, 2018 - Elsevier
Cross-site scripting and injection vulnerabilities are among the most common and serious
security issues for Web applications. Although existing static analysis approaches can detect …

Experiences with PDG-based IFC

C Hammer - Engineering Secure Software and Systems: Second …, 2010 - Springer
Abstract Information flow control systems provide the guarantees that are required in today's
security-relevant systems. While the literature has produced a wealth of techniques to …

Security slicing for auditing XML, XPath, and SQL injection vulnerabilities

J Thomé, LK Shar, L Briand - 2015 IEEE 26th International …, 2015 - ieeexplore.ieee.org
XML, XPath, and SQL injection vulnerabilities are among the most common and serious
security issues for Web applications and Web services. Thus, it is important for security …

[ΒΙΒΛΙΟ][B] A machine-checked, type-safe model of Java concurrency: language, virtual machine, memory model, and verified compiler

A Lochbihler - 2014 - books.google.com
The Java programming language provides safety and security guarantees such as type
safety and its security architecture. They distinguish it from other mainstream programming …

Joanaudit: A tool for auditing common injection vulnerabilities

J Thomé, LK Shar, D Bianculli, LC Briand - Proceedings of the 2017 11th …, 2017 - dl.acm.org
JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and
Web services for common injection vulnerabilities during software development. It …