Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
COLUMN: PLAS 2008
abstract
PLAS 2008 paper abstracts
research-article
A type system for data-flow integrity on Windows Vista

The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow attack. Thus, it is possible to eliminate such attacks by statically ...

research-article
Verified enforcement of stateful information release policies

Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces ...

research-article
Programming languages and program analysis for security: a three-year retrospective

Software security has been traditionally enforced at the level of operating systems. However, operating systems have become increasingly large and complex, and it is very difficult--if not impossible--to enforce software security solely through them. ...

Subjects

Comments