Li S, Kang M, Hou J and Cao Y. Detecting Node.js prototype pollution vulnerabilities via object lookup analysis. Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. (268-279).
Almousa M, Keshavarz M and Anwar M.
(2020). Awareness and Working Knowledge of Secure Design Principles: A User Study. HCI for Cybersecurity, Privacy and Trust. 10.1007/978-3-030-50309-3_1. (3-15).
Son S, McKinley K and Shmatikov V. RoleCast. Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications. (1069-1084).
Srivastava V, Bond M, McKinley K and Shmatikov V. A security policy oracle. Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. (343-354).
Srivastava V, Bond M, McKinley K and Shmatikov V.
(2011). A security policy oracle. ACM SIGPLAN Notices. 46:6. (343-354). Online publication date: 4-Jun-2011.
Fontaine A, Hym S and Simplot-Ryl I. On-device control flow verification for Java programs. Proceedings of the Third international conference on Engineering secure software and systems. (43-57).
Fontaine A, Hym S and Simplot-Ryl I.
(2011). On-Device Control Flow Verification for Java Programs. Engineering Secure Software and Systems. 10.1007/978-3-642-19125-1_4. (43-57).
Yan F and Fong P. Efficient IRM enforcement of history-based access control policies. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. (35-46).