Abstract is missing.
- Efficient, context-sensitive detection of real-world semantic attacksMichael D. Bond, Varun Srivastava, Kathryn S. McKinley, Vitaly Shmatikov. 1 [doi]
- Attack model for verification of interval security properties for smart card C codesPascal Berthomé, Karine Heydemann, X. Kauffmann-Tourkestansky, Jean-François Lalande. 2 [doi]
- Permissive dynamic information flow analysisThomas H. Austin, Cormac Flanagan. 3 [doi]
- A more precise security type system for dynamic security testsGregory Malecha, Stephen Chong. 4 [doi]
- Restricted delegation and revocation in language-based security: (position paper)D. Hassan, Mohammad Reza Mousavi, Michel A. Reniers. 5 [doi]
- The case for JavaScript transactions: position paperMohan Dhawan, Chung-chieh Shan, Vinod Ganapathy. 6 [doi]
- Class properties for security review in an object-capability subset of Java: (short paper)Adrian Mettler, David Wagner. 7 [doi]
- Secure information flow analysis for hardware design: using the right abstraction for the jobXun Li 0001, Mohit Tiwari, Ben Hardekopf, Timothy Sherwood, Frederic T. Chong. 8 [doi]