JFlow
From MaRDI portal
Software:32413
swMATH20595MaRDI QIDQ32413FDOQ32413
Author name not available (Why is that?)
Cited In (22)
- Access control in a core calculus of dependency
- Arrows for secure information flow
- Title not available (Why is that?)
- Formal verification of side-channel countermeasures using self-composition
- Specification and static enforcement of scheduler-independent noninterference in a middleweight Java
- Security types preserving compilation
- Secure information flow connections
- Secured information flow for asynchronous sequential processes
- Rewriting-Based Runtime Verification for Alternation-Free HyperLTL
- Instruction-level security analysis for information flow in stack-based assembly languages
- Title not available (Why is that?)
- SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors
- Attacker Control and Impact for Confidentiality and Integrity
- Information Flow Analysis for Valued-Indexed Data Security Compartments
- A verifiable low-level concurrent programming model based on colored Petri nets
- Noninterference for concurrent programs and thread systems
- \textsf{BackFlow}: backward context-sensitive flow reconstruction of taint analysis results
- A secrecy-preserving language for distributed and object-oriented systems
- Securing the Future — An Information Flow Analysis of a Distributed OO Language
- Program synthesis for interactive-security systems
- Information Flow in Object-Oriented Software
- Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis
This page was built for software: JFlow