Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
ENCoVer: Symbolic Exploration for Information Flow Security, 2012 IEEE 25th Computer Security Foundations Symposium, pp.30-44, 2012. ,
DOI : 10.1109/CSF.2012.24
What You Lose is What You Leak: Information Leakage in Declassification Policies, Electronic Notes in Theoretical Computer Science, vol.173, pp.47-66, 2007. ,
DOI : 10.1016/j.entcs.2007.02.027
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Relational Verification Using Product Programs, Proc. of the 17th Intl. Conf. on Formal Methods, pp.200-214, 2011. ,
DOI : 10.1007/978-3-540-68237-0_5
Secure Information Flow by Self- Composition, Proc. of the 17th IEEE Workshop on Computer Security Foundations, pp.100-114, 2004. ,
Information Flow in Object-Oriented Software, Post Proc. Logic-Based Program Synthesis and Transformation, 2014. ,
DOI : 10.1007/978-3-319-14125-1_2
Verification of Object-oriented Software: The KeY Approach, 2007. ,
DOI : 10.1007/978-3-540-69061-0
Information Transmission in Sequential Programs. Foundations of Secure Computation pp, pp.297-335, 1978. ,
A Theorem Proving Approach to Analysis of Secure Information Flow, Issues in the Theory of Security. IFIP WG 1.7, 2003. ,
DOI : 10.1007/978-3-540-32004-3_20
A Theorem Proving Approach to Analysis of Secure Information Flow, Proc. of the 2nd Intl. Conf. on Security in Pervasive Computing SPC'05, pp.193-209, 2005. ,
DOI : 10.1007/978-3-540-32004-3_20
Generating Unit Tests from Formal Proofs, Proc. of Tests and Proofs, 2007. ,
DOI : 10.1007/978-3-540-73770-4_10
Using JOANA for Information Flow Control in Java Programs -A Practical Guide, Proc. of the 6th Working Conf. on Programming Languages, pp.123-138, 2013. ,
Visualizing Unbounded Symbolic Execution, Proc. of Tests and Proofs, pp.82-98, 2014. ,
DOI : 10.1007/978-3-319-09099-3_7
On flow-sensitive security types, ACM SIGPLAN Notices, vol.41, issue.1, pp.79-90, 2006. ,
DOI : 10.1145/1111320.1111045
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
Noninterference via Symbolic Execution, Proc. of FMOODS'12, pp.152-168, 2012. ,
DOI : 10.1007/978-3-642-30793-5_10
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Verification of Information Flow and Access Control Policies with Dependent Types, Proc. of the 2011 IEEE Symp. on Security and Privacy, pp.165-179, 2011. ,
Self-composition by Symbolic Execution, Imperial College Computing Student Workshop. OASIcs, pp.95-102, 2013. ,
A Model for Delimited Information Release, Software Security-Theories and Systems, pp.174-191, 2004. ,
DOI : 10.1007/978-3-540-37621-7_9
Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009. ,
DOI : 10.3233/JCS-2009-0352
Verification of Information Flow Properties of Java Programs without Approximations, LNCS, vol.7421, pp.232-249, 2012. ,
DOI : 10.1007/978-3-642-31762-0_15
Secure Information Flow as a Safety Problem, Proc. of the 12th Intl. Conf. Static Analysis SAS'05, pp.352-367, 2005. ,
DOI : 10.1007/11547662_24
Inference of Expressive Declassification Policies, 2011 IEEE Symposium on Security and Privacy, pp.180-195, 2011. ,
DOI : 10.1109/SP.2011.20
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
A Theorem Prover Backed Approach to Array Abstraction, Proc. of VSL 2014 ? WING Workshop, 2014. ,