Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Towards a logical account of declassification, Proceedings of the 2007 workshop on Programming languages and analysis for security , PLAS '07, pp.61-66, 2007. ,
DOI : 10.1145/1255329.1255340
Secure information flow by self-composition, Proceedings of the 17th IEEE workshop on Computer Security Foundations, pp.100-114, 2004. ,
Non-interference for a JVM-like language. TLDI '05, pp.103-112, 2005. ,
DOI : 10.1145/1040294.1040304
KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. OSDI'08, pp.209-224, 2008. ,
Information transmission in sequential programs Academic Press, 1978. 8. ´ Adám Darvas, Reiner Hähnle, and David Sands. A theorem proving approach to analysis of secure information flow, Foundations of Secure Computation, pp.297-335, 2004. ,
A Classification of Security Properties for Process Algebras1, Journal of Computer Security, vol.3, issue.1, pp.5-34, 1995. ,
DOI : 10.3233/JCS-1994/1995-3103
Abstract non-interference: Parameterizing non-interference by abstract interpretation ,
DOI : 10.1145/982962.964017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.9512
Dart: directed automated random testing, Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, PLDI '05, pp.213-223, 2005. ,
A semantic approach to secure information flow, Science of Computer Programming, vol.37, issue.1-3, pp.113-138, 2000. ,
DOI : 10.1016/S0167-6423(99)00024-6
URL : http://doi.org/10.1016/s0167-6423(99)00024-6
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
Enforcing robust declassification and qualified robustness, Journal of Computer Security, vol.14, issue.2, pp.157-196, 2006. ,
Information flow inference for ML. SIG- PLAN Not, pp.319-330, 2002. ,
DOI : 10.1145/565816.503302
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
A Model for Delimited Information Release, Proc. International Symp. on Software Security (ISSS03), pp.174-191, 2004. ,
DOI : 10.1007/978-3-540-37621-7_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1670
Dimensions and principles of declassification, Proceedings of the 18th IEEE workshop on Computer Security Foundations, pp.255-269, 2005. ,
DOI : 10.1109/csfw.2005.15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3688
CUTE: a concolic unit testing engine for C. SIGSOFT Software Engineering Notes, pp.263-272, 2005. ,
DOI : 10.1145/1321631.1321746
Secure Information Flow as a Safety Problem, Static Analysis Symposium/Workshop on Static Analysis, pp.352-367, 2005. ,
DOI : 10.1007/11547662_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.7731
A type-based approach to program security, TAPSOFT '97, pp.607-621, 1997. ,
Observational determinism for concurrent program security, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.29-43, 2003. ,
DOI : 10.1109/CSFW.2003.1212703
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3238
Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001. ,
DOI : 10.1109/CSFW.2001.930133
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1928