Efficient purely-dynamic information flow analysis, PLAS, 2009. ,
DOI : 10.1145/1667209.1667223
Run-time Monitoring and Formal Analysis of Information Flows in Chromium, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23295
URL : http://www.ece.cmu.edu/%7Elbauer/papers/2015/ndss2015-browser-info-flow.pdf
Information Flow Control in WebKit???s JavaScript Bytecode, 2014. ,
DOI : 10.1007/978-3-642-54792-8_9
URL : http://arxiv.org/pdf/1401.4339
A Taxonomy of Information Flow Monitors, 2016. ,
DOI : 10.1109/CSF.2013.9
URL : https://hal.archives-ouvertes.fr/hal-01348188
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.15
Correct blame for contracts: No more scapegoating, POPL, 2011. ,
DOI : 10.1145/1925844.1926410
Oh Lord, please don't let contracts be misunderstood (functional pearl), ICFP, 2016. ,
DOI : 10.1145/3022670.2951930
Contracts for higher-order functions, ICFP, 2002. ,
DOI : 10.1145/583852.581484
URL : http://people.cs.uchicago.edu/~robby/pubs/papers/ho-contracts-techreport.ps
, File System ? Node.js v9.2.0 Documentation, 2017.
Contracts made manifest, POPL, 2010. ,
FlowFox, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382275
Secure multi-execution of web scripts: Theory and practice, Journal of Computer Security, vol.22, issue.4, 2014. ,
DOI : 10.3233/JCS-130495
Information-flow security for JavaScript and??its APIs, Journal of Computer Security, vol.4, issue.3, 2015. ,
DOI : 10.3233/JCS-1996-42-304
JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014. ,
DOI : 10.1145/2554850.2554909
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.19
URL : http://www.cse.chalmers.se/~andrei/jsflow-csf12.pdf
A Principled Approach to Tracking Information Flow in the Presence of Libraries, 2017. ,
DOI : 10.1007/978-3-540-73589-2_2
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control, 2015. ,
DOI : 10.1007/978-3-662-46666-7_2
The Coq Proof Assistant, 2017. ,
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.19
Effective blame for information-flow violations, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2008. ,
DOI : 10.1145/1453101.1453135
Proxy. https://developer.mozilla, 2018. ,
, , 2018.
Secure Multi-Execution: Fine-grained, Declassification-aware, and Transparent, CSF, 2013. ,
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
Two approaches to interprocedural data flow analysis. Program Flow Analysis: Theory and Applications, 1981. ,
Information Flow Tracking for Sideeffectful Libraries -Full version ,
Programming Languages for Information Security, 2002. ,