Abstract is missing.
- Language-based security on AndroidAvik Chaudhuri. 1-7 [doi]
- ActionScript bytecode verification with co-logic programmingBrian W. DeVries, Gopal Gupta, Kevin W. Hamlen, Scott Moore, Meera Sridhar. 9-15 [doi]
- Encoding information flow in AuraLimin Jia, Steve Zdancewic. 17-29 [doi]
- On PDG-based noninterference and its modular proofDaniel Wasserrab, Denis Lohner, Gregor Snelting. 31-44 [doi]
- Catch me if you can: permissive yet secure error handlingAslan Askarov, Andrei Sabelfeld. 45-57 [doi]
- A weakest precondition approach to active attacks analysisMusard Balliu, Isabella Mastroeni. 59-71 [doi]
- Measuring channel capacity to distinguish undue influenceJames Newsome, Stephen McCamant, Dawn Song. 73-85 [doi]
- An implementation and semantics for transactional memory introspection in HaskellArnar Birgisson, Úlfar Erlingsson. 87-99 [doi]
- Flow-sensitive semantics for dynamic information flow policiesNiklas Broberg, David Sands. 101-112 [doi]
- Efficient purely-dynamic information flow analysisThomas H. Austin, Cormac Flanagan. 113-124 [doi]
- A language for information flow: dynamic tracking in multiple interdependent dimensionsAvraham Shinnar, Marco Pistoia, Anindya Banerjee. 125-131 [doi]