JFlow
From MaRDI portal
Software:32413
swMATH20595MaRDI QIDQ32413FDOQ32413
Author name not available (Why is that?)
Cited In (22)
- Access control in a core calculus of dependency
- Arrows for secure information flow
- Formal verification of side-channel countermeasures using self-composition
- Using dynamic pushdown networks to automate a modular information-flow analysis
- Rewriting-based runtime verification for alternation-free HyperLTL
- Output-sensitive information flow analysis
- Specification and static enforcement of scheduler-independent noninterference in a middleweight Java
- Security types preserving compilation
- Secure information flow connections
- Attacker control and impact for confidentiality and integrity
- Secured information flow for asynchronous sequential processes
- Information flow analysis for valued-indexed data security compartments
- Information flow in object-oriented software
- Instruction-level security analysis for information flow in stack-based assembly languages
- Title not available (Why is that?)
- SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors
- A verifiable low-level concurrent programming model based on colored Petri nets
- Noninterference for concurrent programs and thread systems
- \textsf{BackFlow}: backward context-sensitive flow reconstruction of taint analysis results
- A secrecy-preserving language for distributed and object-oriented systems
- Securing the future -- an information flow analysis of a distributed OO language
- Program synthesis for interactive-security systems
This page was built for software: JFlow