The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PLAS"( http://dblp.L3S.de/Venues/PLAS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pldi

Publication years (Num. hits)
2006-2007 (26) 2008-2009 (26) 2010-2011 (18) 2012-2013 (20)
Publication types (Num. hits)
inproceedings(82) proceedings(8)
Venues (Conferences, Journals, ...)
PLAS(90)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 148 occurrences of 100 keywords

Results
Found 90 publication records. Showing 90 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Prasad Naldurg, Nikhil Swamy (eds.) Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2013, Seattle, WA, USA, June 20, 2013 Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  BibTeX  RDF
1Martin Mariusz Lester Position paper: the science of boxing. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Timothy L. Hinrichs, Daniele Rossetti, Gabriele Petronella, V. N. Venkatakrishnan, A. Prasad Sistla, Lenore D. Zuck WEBLOG: a declarative language for secure web development. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Per A. Hallgren, Daniel T. Mauritzson, Andrei Sabelfeld GlassTube: a lightweight approach to web application integrity. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas H. Austin, Jean Yang 0001, Cormac Flanagan, Armando Solar-Lezama Faceted execution of policy-agnostic programs. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Gampe, Jeffery von Ronne Security completeness: towards noninterference in composed languages. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Keil 0002, Peter Thiemann 0001 Type-based dependency analysis for javascript. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xun Li 0001, Vineeth Kashyap, Jason K. Oberg, Mohit Tiwari, Vasanth Ram Rajarathinam, Ryan Kastner, Timothy Sherwood, Ben Hardekopf, Frederic T. Chong Position paper: Sapper - a language for provable hardware policy enforcement. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aseem Rastogi, Piotr Mardziel, Michael Hicks 0001, Matthew A. Hammer Knowledge inference for optimizing secure multi-party computation. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Sands 0001 Fault-tolerant non-interference: invited talk abstract. Search on Bibsonomy PLAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eric Bodden Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paper. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alejandro Mario Hernandez, Flemming Nielson A generic approach for security policies composition: position paper. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuying Liang, Matthew Might Hash-flow taint analysis of higher-order programs. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Damien Doligez, Mathieu Jaume, Renaud Rioboo Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environment. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dominic Duggan, Ye Wu 0006 Security correctness for secure nested transactions: position paper. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Luciano Bello, Alejandro Russo Towards a taint mode for cloud computing web applications. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Soha Hussein, Patrick O'Neil Meredith, Grigore Rosu Security-policy monitoring and enforcement with JavaMOP. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sergio Maffeis, Tamara Rezk (eds.) Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, PLAS 2012, Beijing, China, 15 June, 2012 Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  BibTeX  RDF
1Ana Almeida Matos, José Fragoso Santos Typing illegal information flows as program effects. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Piotr Mardziel, Michael Hicks 0001, Jonathan Katz, Mudhakar Srivatsa Knowledge-oriented secure multiparty computation. Search on Bibsonomy PLAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Andrei Sabelfeld Limiting information leakage in event-based communication. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ziyuan Meng, Geoffrey Smith 0001 Calculating bounds on information leakage using two-bit patterns. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matteo Maffei, Kim Pecina Privacy-aware proof-carrying authorization. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld Capabilities for information flow. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joseph L. Greathouse, Todd M. Austin The potential of sampling for dynamic analysis. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arnar Birgisson, Frank McSherry, Martín Abadi Differential privacy with information flow control. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Joshua D. Guttman (eds.) Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, PLAS 2011, San Jose, CA, USA, 5 June, 2011 Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  BibTeX  RDF
1Musard Balliu, Mads Dam, Gurvan Le Guernic Epistemic temporal logic for information flow security. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sooel Son, Vitaly Shmatikov SAFERPHP: finding semantic vulnerabilities in PHP applications. Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael D. Bond, Varun Srivastava, Kathryn S. McKinley, Vitaly Shmatikov Efficient, context-sensitive detection of real-world semantic attacks. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gregory Malecha, Stephen Chong A more precise security type system for dynamic security tests. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xun Li 0001, Mohit Tiwari, Ben Hardekopf, Timothy Sherwood, Frederic T. Chong Secure information flow analysis for hardware design: using the right abstraction for the job. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1D. Hassan, Mohammad Reza Mousavi 0001, Michel A. Reniers Restricted delegation and revocation in language-based security: (position paper). Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adrian Mettler, David A. Wagner 0001 Class properties for security review in an object-capability subset of Java: (short paper). Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anindya Banerjee 0001, Deepak Garg 0001 (eds.) Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, ON, Canada, 10 June, 2010 Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  BibTeX  RDF
1Thomas H. Austin, Cormac Flanagan Permissive dynamic information flow analysis. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande Attack model for verification of interval security properties for smart card C codes. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy The case for JavaScript transactions: position paper. Search on Bibsonomy PLAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brian W. DeVries, Gopal Gupta 0001, Kevin W. Hamlen, Scott Moore, Meera Sridhar ActionScript bytecode verification with co-logic programming. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ActionScript, coinductive logic programming, in-lined reference monitoring, model checking, verification
1James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
1Arnar Birgisson, Úlfar Erlingsson An implementation and semantics for transactional memory introspection in Haskell. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transactional memory, reference monitors
1Musard Balliu, Isabella Mastroeni A weakest precondition approach to active attacks analysis. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF robustness, non-interference, declassification, program semantics, active attackers
1Limin Jia 0001, Steve Zdancewic Encoding information flow in Aura. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, information flow control, declassification, security type system, authorization logic
1Thomas H. Austin, Cormac Flanagan Efficient purely-dynamic information flow analysis. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic analysis, information flow control
1Aslan Askarov, Andrei Sabelfeld Catch me if you can: permissive yet secure error handling. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF exception handling, security type system
1Daniel Wasserrab, Denis Lohner, Gregor Snelting On PDG-based noninterference and its modular proof. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modularity, program slicing, noninterference, correctness proof, program dependence graph
1Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 A language for information flow: dynamic tracking in multiple interdependent dimensions. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information flow control, declassification, security type system
1Avik Chaudhuri Language-based security on Android. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data-flow security, hybrid type system, mobile code, certified compilation
1Niklas Broberg, David Sands 0001 Flow-sensitive semantics for dynamic information flow policies. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information flow control, declassification, security type system
1Stephen Chong, David A. Naumann (eds.) Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009 Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Hammer 0001, Rüdiger Schaade, Gregor Snelting Static path conditions for Java. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF java, program slicing, information flow control, dynamic dispatch, path condition
1Pasquale Malacaria, Han Chen Lagrange multipliers and maximum information leakage in different observational models. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, information theory, lagrange multipliers
1Lantian Zheng, Andrew C. Myers Securing nonintrusive web encryption through information flow. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, type system, information flow control
1Clifford Liem, Yuan Xiang Gu, Harold Johnson A compiler-based infrastructure for software-protection. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compiler-based techniques, software protection, tamper resistance, code transformation
1Kevin W. Hamlen, Micah Jones Aspect-oriented in-lined reference monitors. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF in-lined reference monitors, object-oriented programming, aspect-oriented programming, runtime verification, security automata
1Alan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin A security domain model to assess software for exploitable covert channels. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automated program verification, security domain model, static analysis, specification language, covert channel, dynamic slicing
1James Cheney, Morten Dahl Resource bound analysis for database queries. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF resource bounds, databases, query languages
1Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani A type system for data-flow integrity on windows vista. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data-flow integrity, hybrid type system, explicit substitution, dynamic access control
1Miranda Mowbray, Antonio Lain Dominator-tree analysis for distributed authorization. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, dominator tree, distributed authorization
1Riccardo Focardi, Matteo Centenaro Information flow security of multi-threaded distributed programs. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symbolic cryptography, information flow, bisimulation, language-based security
1Dejan Baca, Bengt Carlsson, Lars Lundberg Evaluating the cost reduction of static code analysis for software security. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coverity prevent, early fault detection, trouble report, security, source code, false positive, cost reduction, static code analysis
1Nikhil Swamy, Michael Hicks 0001 Verified enforcement of stateful information release policies. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certified evaluation, state modifying, dependent, declassification, affine, singleton types
1Fabio Massacci, Ida Sri Rejeki Siahaan Simulating midlet's security claims with automata modulo theory. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security policy, automata, mobile code
1Úlfar Erlingsson, Marco Pistoia (eds.) Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008 Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  BibTeX  RDF
1Stephen McCamant, Michael D. Ernst A simulation-based proof technique for dynamic information flow. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF implicit flow, dynamic analysis, information-flow analysis
1Boniface Hicks, Dave King 0002, Patrick D. McDaniel Jifclipse: development tools for security-typed languages. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Jif, security-typed languages, Eclipse, developer tools
1Karl Chen, David A. Wagner 0001 Large-scale analysis of format string vulnerabilities in Debian Linux. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format string vulnerability, large-scale analysis, type-qualifier inference
1Geoffrey Smith 0001, Rafael Alpízar Fast probabilistic simulation, nontermination, and secure information flow. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF probabilistic noninterference, type systems
1Aslan Askarov, Andrei Sabelfeld Localized delimited release: combining the what and where dimensions of information release. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF de-classification, information flow, security policies, noninterference, downgrading
1Han Chen, Pasquale Malacaria Quantitative analysis of leakage for multi-threaded programs. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-threaded languages, security, information theory
1Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg Towards a logical account of declassification. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
1Michael W. Hicks (eds.) Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007 Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  BibTeX  RDF
1Scott F. Smith 0001, Mark Thober Improving usability of information flow security in java. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF java, security policies, type inference, declassification, information flow security
1Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett Informal presentation: a trust management perspective on managing policy updates in security-typed languages. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1John Case, Samuel E. Moelius Cautious virus detection in the extreme. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF co-isolated sets, program self-reference, simple sets, virus detection, recursion theorems
1Janus Dam Nielsen, Michael I. Schwartzbach A domain-specific programming language for secure multiparty computation. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMCL, design, implementation, analysis
1Hassen Saïdi Guarded models for intrusion detection. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, dynamic analysis, invariant generation
1V. Benjamin Livshits, Úlfar Erlingsson Using web application construction frameworks to protect against code injection attacks. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software construction frameworks, software security, same-origin policy, code injection attacks
1Nenad Jovanovic, Christopher Kruegel, Engin Kirda Precise alias analysis for static detection of web application vulnerabilities. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF scripting languages security, static analysis, program analysis, data flow analysis, PHP, alias analysis, cross-site scripting, web application security
1Hiroshi Unno 0001, Naoki Kobayashi 0001, Akinori Yonezawa Combining type-based analysis and model checking for finding counterexamples against non-interference. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF model checking, type system, non-interference
1Katia Hristova, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller Efficient type inference for secure information flow. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, algorithm, information flow, time complexity, type inference
1Vugranam C. Sreedhar, Steve Zdancewic (eds.) Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006 Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  BibTeX  RDF
1Jeff Polakow, Christian Skalka Specifying distributed trust management in LolliMon. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust management logic, distributed authorization
1Timothy Fraser, Nick L. Petroni Jr., William A. Arbaugh Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CQUAL, static analysis, type qualifiers, MINIX
1Scott F. Smith 0001, Mark Thober Refactoring programs to secure information flows. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF refactoring, information flow, slicing, declassification
1Michael Yanguo Liu, Issa Traoré Empirical relation between coupling and attackability in software systems: : a case study on DOS. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software quality, software metrics, denial of service, attackability, security engineering
1Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider Certified In-lined Reference Monitoring on .NET. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF in-lined reference monitoring, program rewriting, reference monitors, security automata, execution monitoring
1Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 Trusted declassification: : high-level policy for a security-typed language. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification
1Xiaoqi Lu, Scott F. Smith 0001 A microkernel virtual machine: : building security with clear interfaces. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java, access control, frameworks, virtual machine, interface, kernel, language-based security
1David A. Wagner 0001 Object capabilities for security. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #90 of 90 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license