Alignment Completeness for Relational Hoare Logics | 0 | 0.34 | 2021 |
Type-Based Declassification for Free. | 0 | 0.34 | 2020 |
Typed-based Relaxed Noninterference for Free | 0 | 0.34 | 2019 |
Whither Specifications as Programs. | 0 | 0.34 | 2019 |
Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies | 2 | 0.36 | 2018 |
Hypercollecting Semantics and its Application to Static Analysis of Information Flow. | 3 | 0.38 | 2017 |
An Illustrated Guide to the Model Theory of Supertype Abstraction and Behavioral Subtyping. | 0 | 0.34 | 2017 |
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications | 1 | 0.35 | 2017 |
Specifying and Verifying Advanced Control Features. | 2 | 0.37 | 2016 |
Calculational Design of Information Flow Monitors (extended version). | 0 | 0.34 | 2016 |
Calculational Design of Information Flow Monitors | 5 | 0.40 | 2016 |
Relational Logic with Framing and Hypotheses. | 0 | 0.34 | 2016 |
Relational Logic with Framing and Hypotheses: Technical Report. | 0 | 0.34 | 2016 |
Inlined Information Flow Monitoring for JavaScript | 16 | 0.52 | 2015 |
Towards patterns for heaps and imperative lambdas. | 0 | 0.34 | 2015 |
Behavioral Subtyping, Specification Inheritance, and Modular Reasoning | 30 | 0.87 | 2015 |
Information Flow Monitoring as Abstract Interpretation for Relational Logic | 13 | 0.51 | 2014 |
A Logical Analysis of Framing for Specifications with Pure Method Calls. | 1 | 0.35 | 2014 |
Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony | 5 | 0.48 | 2013 |
A Simple Semantics And Static Analysis For Stack Inspection | 0 | 0.34 | 2013 |
Local Reasoning for Global Invariants, Part II: Dynamic Boundaries | 3 | 0.36 | 2013 |
Laws of Programming for References. | 0 | 0.34 | 2013 |
Local Reasoning for Global Invariants, Part I: Region Logic | 9 | 0.48 | 2013 |
Refactoring and representation independence for class hierarchies | 4 | 0.44 | 2012 |
Decision procedures for region logic | 3 | 0.39 | 2012 |
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. | 4 | 0.41 | 2011 |
Guiding a general-purpose C verifier to prove cryptographic protocols. | 16 | 0.63 | 2011 |
Refactoring and representation independence for class hierarchies: extended abstract | 3 | 0.44 | 2010 |
Local reasoning and dynamic framing for the composite pattern and its clients | 9 | 0.48 | 2010 |
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions | 4 | 0.51 | 2010 |
Information Flow Monitor Inlining | 35 | 1.23 | 2010 |
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009 | 9 | 2.20 | 2009 |
Category Theoretic Models of Data Refinement | 3 | 0.47 | 2009 |
Regional Logic for Local Reasoning about Global Invariants | 46 | 1.88 | 2008 |
Boogie Meets Regions: A Verification Experience Report | 13 | 0.76 | 2008 |
Expressive Declassification Policies and Modular Static Enforcement | 56 | 1.64 | 2008 |
Towards a logical account of declassification | 8 | 0.57 | 2007 |
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model | 28 | 1.08 | 2007 |
Observational purity and encapsulation | 10 | 0.58 | 2007 |
On assertion-based encapsulation for object invariants and simulations | 3 | 0.50 | 2007 |
Deriving an Information Flow Checker and Certifying Compiler for Java | 27 | 0.90 | 2006 |
Allowing state changes in specifications | 3 | 0.38 | 2006 |
From coupling relations to mated invariants for checking information flow | 23 | 0.93 | 2006 |
Closing internal timing channels by transformation | 19 | 0.76 | 2006 |
Verifying a secure information flow analyzer | 10 | 0.68 | 2005 |
Stack-based access control and secure information flow | 101 | 3.53 | 2005 |
Observational purity and encapsulation | 7 | 0.63 | 2005 |
Language-Based Security, 5.-10. October 2003 | 2 | 0.91 | 2005 |
State based ownership, reentrance, and encapsulation | 19 | 0.87 | 2005 |
History-based access control and secure information flow | 72 | 2.64 | 2004 |