On-the-fly inlining of dynamic security monitors
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in su...
Uložené v:
| Vydané v: | Computers & security Ročník 31; číslo 7; s. 827 - 843 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Amsterdam
Elsevier Ltd
01.10.2012
Elsevier Sequoia S.A |
| Predmet: | |
| ISSN: | 0167-4048, 1872-6208 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime. To secure this construct, our inlining is done on the fly, at the string evaluation time, and, just like conventional offline inlining, requires no modification of the hosting runtime environment. We present a forma!lization for a simple language to show that the inlined code is secure: it satisfies a non-interference property. We also discuss practical considerations experimental results based on both manual and automatic code rewriting. |
|---|---|
| AbstractList | How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime. To secure this construct, our inlining is done on the fly, at the string evaluation time, and, just like conventional offline inlining, requires no modification of the hosting runtime environment. We present a forma!lization for a simple language to show that the inlined code is secure: it satisfies a non-interference property. We also discuss practical considerations experimental results based on both manual and automatic code rewriting. How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime. To secure this construct, our inlining is done on the fly, at the string evaluation time, and, just like conventional offline inlining, requires no modification of the hosting runtime environment. We present a formalization for a simple language to show that the inlined code is secure: it satisfies a non-interference property. We also discuss practical considerations experimental results based on both manual and automatic code rewriting. How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based information-flow security considers programs that manipulate pieces of data at different sensitivity levels. Securing information flow in such programs remains an open challenge. Recently, considerable progress has been made on understanding dynamic monitoring for secure information flow. This paper presents a framework for inlining dynamic information-flow monitors. A novel feature of our framework is the ability to perform inlining on the fly. We consider a source language that includes dynamic code evaluation of strings whose content might not be known until runtime. To secure this construct, our inlining is done on the fly, at the string evaluation time, and, just like conventional offline inlining, requires no modification of the hosting runtime environment. We present a forma!lization for a simple language to show that the inlined code is secure: it satisfies a non-interference property. We also discuss practical considerations experimental results based on both manual and automatic code rewriting. [PUBLICATION ABSTRACT] |
| Author | Russo, Alejandro Magazinius, Jonas Sabelfeld, Andrei |
| Author_xml | – sequence: 1 givenname: Jonas surname: Magazinius fullname: Magazinius, Jonas – sequence: 2 givenname: Alejandro surname: Russo fullname: Russo, Alejandro – sequence: 3 givenname: Andrei surname: Sabelfeld fullname: Sabelfeld, Andrei email: andrei@chalmers.se |
| BackLink | https://research.chalmers.se/publication/148773$$DView record from Swedish Publication Index (Chalmers tekniska högskola) |
| BookMark | eNp9kMFqGzEQhkVJoU6aF8hpoed1R1qtpEIvJbRpIZBD2vOglWZjmbXkSnKL3z4yLj3kkNPA8H__MN8lu4gpEmM3HNYcuPq4XbtUaC2A87ZYA4g3bMWNFr0SYC7YqoV0L0Gad-yylC0A18qYFYOH2NcN9fNy7EJcQgzxqUtz54_R7oLrCrlDDvXY7VIMNeXynr2d7VLo-t-8Yr--ff15-72_f7j7cfvlvnftSu1HmI3X3CkJwnHw2pAEZ7zyg7OWxtkoLT0okJLP82zNxAWR1dQ-UHKi4Yo9nnvLX9ofJtznsLP5iMkGzFTIZrdBt7HLjnLBQjiCkXZSAwrSFiUfBU5m0uikGCdv7cQ9b60fzq37nH4fqFTcpkOO7RHknAsxDAY-tZQ4p1xOpWSa_1_ngCffuMWTbzz5Pu2a7waZF5AL1daQYs02LK-jn88oNaF_AmUsLlB05EMmV9Gn8Br-DPZdnQU |
| CODEN | CPSEDU |
| CitedBy_id | crossref_primary_10_1093_comjnl_bxw022 crossref_primary_10_1016_j_cose_2017_04_001 crossref_primary_10_1016_j_infsof_2015_12_006 crossref_primary_10_1016_j_cose_2018_01_017 |
| Cites_doi | 10.1093/comjnl/17.2.143 10.1145/1281480.1281481 10.1007/s10207-004-0046-8 10.3233/JCS-1996-42-304 10.1023/A:1025055424017 10.1145/1111596.1111601 10.1145/359636.359712 10.1145/353323.353382 10.1145/363516.363520 10.1145/1046191.1032305 10.1109/JSAC.2002.806121 |
| ContentType | Journal Article |
| Copyright | 2011 Elsevier Ltd Copyright Elsevier Sequoia S.A. Oct 2012 |
| Copyright_xml | – notice: 2011 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Oct 2012 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D ADTPV AOWAS F1S |
| DOI | 10.1016/j.cose.2011.10.002 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional SwePub SwePub Articles SWEPUB Chalmers tekniska högskola |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-6208 |
| EndPage | 843 |
| ExternalDocumentID | oai_research_chalmers_se_5084ab63_2e7a_4152_b8b7_c425bdaab1d1 2789641691 10_1016_j_cose_2011_10_002 S0167404811001180 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD JQ2 K7. L7M L~C L~D ADTPV AOWAS F1S |
| ID | FETCH-LOGICAL-c404t-50f8d71c6402c10d78e40c8d6d3caae5f8674d060441fffa8b12eea7e01164be3 |
| ISICitedReferencesCount | 16 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000311021100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-4048 |
| IngestDate | Wed Nov 05 04:20:05 EST 2025 Thu Nov 20 01:24:51 EST 2025 Sat Nov 29 05:55:39 EST 2025 Tue Nov 18 21:48:57 EST 2025 Fri Feb 23 02:20:18 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Non-interference Information flow Reference monitors Language-based security Inlining |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c404t-50f8d71c6402c10d78e40c8d6d3caae5f8674d060441fffa8b12eea7e01164be3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
| PQID | 1112233809 |
| PQPubID | 46289 |
| PageCount | 17 |
| ParticipantIDs | swepub_primary_oai_research_chalmers_se_5084ab63_2e7a_4152_b8b7_c425bdaab1d1 proquest_journals_1112233809 crossref_primary_10_1016_j_cose_2011_10_002 crossref_citationtrail_10_1016_j_cose_2011_10_002 elsevier_sciencedirect_doi_10_1016_j_cose_2011_10_002 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-10-01 |
| PublicationDateYYYYMMDD | 2012-10-01 |
| PublicationDate_xml | – month: 10 year: 2012 text: 2012-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 2012 |
| Publisher | Elsevier Ltd Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
| References | McCamant, Ernst (bib27) 2008 Wallach, Appel, Felten (bib49) Oct. 2000; 9 Erlingsson U. The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Ithaca, NY, USA, 2004. ANTLR Parser Generator. Reis, Dunagan, Wang, Dubrovsky, Esmeir (bib33) 2007; 1 Ligatti, Bauer, Walker (bib21) 2005; 4 Vogt, Nentwich, Jovanovic, Kirda, Kruegel, Vigna (bib46) Feb. 2007 Simonet (bib42) July 2003 Le Guernic (bib18) July 2007 Austin, Flanagan (bib3) June 2009 Moore, Chong (bib30) June 2011 Facebook (bib12) 2009 Russo, Sabelfeld, Chudnov (bib36) Sept. 2009 Magazinius, Russo, Sabelfeld (bib25) 2010 Volpano, Smith, Irvine (bib48) 1996; 4 Opera, User JavaScript. Eich (bib10) Oct. 2009 Fenton (bib13) May 1974; 17 Chapman, Hilton (bib43) 2004; 24 Volpano (bib47) Sept. 1999; vol. 1694 Maffeis, Taly (bib22) 2009 Shroff, Smith, Thober (bib41) July 2007 Crockford (bib8) 2009 Sabelfeld, Russo (bib38) June 2009 Venkatakrishnan, Xu, DuVarney, Sekar (bib45) Dec. 2006 2011. Chudnov, Naumann (bib6) July 2010 Goguen, Meseguer (bib14) Apr. 1982 Myers, Zheng, Zdancewic, Chong, Nystrom (bib31) July 2001 McLean (bib28) May 1994 Schneider, Morrisett, Harper (bib40) 2000; vol. 2000 Russo, Sabelfeld (bib35) July 2010 Denning, Denning (bib9) July 1977; 20 Winskel (bib50) 1993 Leroy (bib20) 2003; 30 Miller, Samuel, Laurie, Awad, Stay (bib29) 2008 Huang, Yu, Hang, Tsai, Lee, Kuo (bib16) May 2004 Magazinius, Russo, Sabelfeld (bib26) Sept. 2010 Le Guernic, Banerjee, Jensen, Schmidt (bib19) 2006; vol. 4435 Terauchi, Aiken (bib44) Sept. 2005; vol. 3672 Maffeis, Mitchell, Taly (bib23) 2009 Russo, Sabelfeld (bib34) July 2009 Austin, Flanagan (bib4) June 2010 Sabelfeld, Myers (bib37) Jan. 2003; 21 Schneider (bib39) 2000; 3 Magazinius, Askarov, Sabelfeld (bib24) Apr. 2010 Askarov, Sabelfeld (bib2) July 2009 Boudol (bib5) Mar. 2009 Cohen (bib7) 1978 Kozen (bib17) Sept. 1999; vol. 1672 Hamlen, Morrisett, Schneider (bib15) 2006; 28 Eich (10.1016/j.cose.2011.10.002_bib10) 2009 Askarov (10.1016/j.cose.2011.10.002_bib2) 2009 Russo (10.1016/j.cose.2011.10.002_bib34) 2009 Terauchi (10.1016/j.cose.2011.10.002_bib44) 2005; vol. 3672 Wallach (10.1016/j.cose.2011.10.002_bib49) 2000; 9 Maffeis (10.1016/j.cose.2011.10.002_bib23) 2009 Le Guernic (10.1016/j.cose.2011.10.002_bib18) 2007 Moore (10.1016/j.cose.2011.10.002_bib30) 2011 Myers (10.1016/j.cose.2011.10.002_bib31) 2001 10.1016/j.cose.2011.10.002_bib32 Crockford (10.1016/j.cose.2011.10.002_bib8) 2009 Austin (10.1016/j.cose.2011.10.002_bib3) 2009 Magazinius (10.1016/j.cose.2011.10.002_bib26) 2010 Denning (10.1016/j.cose.2011.10.002_bib9) 1977; 20 Maffeis (10.1016/j.cose.2011.10.002_bib22) 2009 McLean (10.1016/j.cose.2011.10.002_bib28) 1994 Russo (10.1016/j.cose.2011.10.002_bib35) 2010 Chapman (10.1016/j.cose.2011.10.002_bib43) 2004; 24 Miller (10.1016/j.cose.2011.10.002_bib29) 2008 Venkatakrishnan (10.1016/j.cose.2011.10.002_bib45) 2006 Reis (10.1016/j.cose.2011.10.002_bib33) 2007; 1 Russo (10.1016/j.cose.2011.10.002_bib36) 2009 Fenton (10.1016/j.cose.2011.10.002_bib13) 1974; 17 Shroff (10.1016/j.cose.2011.10.002_bib41) 2007 Chudnov (10.1016/j.cose.2011.10.002_bib6) 2010 Schneider (10.1016/j.cose.2011.10.002_bib40) 2000; vol. 2000 Volpano (10.1016/j.cose.2011.10.002_bib48) 1996; 4 McCamant (10.1016/j.cose.2011.10.002_bib27) 2008 Cohen (10.1016/j.cose.2011.10.002_bib7) 1978 Sabelfeld (10.1016/j.cose.2011.10.002_bib38) 2009 10.1016/j.cose.2011.10.002_bib11 Huang (10.1016/j.cose.2011.10.002_bib16) 2004 Magazinius (10.1016/j.cose.2011.10.002_bib25) 2010 Le Guernic (10.1016/j.cose.2011.10.002_bib19) 2006; vol. 4435 Volpano (10.1016/j.cose.2011.10.002_bib47) 1999; vol. 1694 Leroy (10.1016/j.cose.2011.10.002_bib20) 2003; 30 Vogt (10.1016/j.cose.2011.10.002_bib46) 2007 Goguen (10.1016/j.cose.2011.10.002_bib14) 1982 Hamlen (10.1016/j.cose.2011.10.002_bib15) 2006; 28 Sabelfeld (10.1016/j.cose.2011.10.002_bib37) 2003; 21 10.1016/j.cose.2011.10.002_bib1 Winskel (10.1016/j.cose.2011.10.002_bib50) 1993 Facebook (10.1016/j.cose.2011.10.002_bib12) 2009 Austin (10.1016/j.cose.2011.10.002_bib4) 2010 Ligatti (10.1016/j.cose.2011.10.002_bib21) 2005; 4 Schneider (10.1016/j.cose.2011.10.002_bib39) 2000; 3 Simonet (10.1016/j.cose.2011.10.002_bib42) 2003 Boudol (10.1016/j.cose.2011.10.002_bib5) 2009 Magazinius (10.1016/j.cose.2011.10.002_bib24) 2010 Kozen (10.1016/j.cose.2011.10.002_bib17) 1999; vol. 1672 |
| References_xml | – year: 2008 ident: bib29 article-title: Caja: safe active content in sanitized javascript – reference: Erlingsson U. The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Ithaca, NY, USA, 2004. – year: Apr. 2010 ident: bib24 article-title: A lattice-based approach to mashup security publication-title: Proc. ACM symposium on information, computer and communications security (ASIACCS) – volume: 28 start-page: 175 year: 2006 end-page: 205 ident: bib15 article-title: Computability classes for enforcement mechanisms publication-title: ACM TOPLAS – volume: 24 start-page: 39 year: 2004 end-page: 46 ident: bib43 article-title: Enforcing security and safety models with an information flow analysis tool publication-title: ACM SIGAda Ada Letters – year: 2009 ident: bib12 article-title: FBJS – year: June 2010 ident: bib4 article-title: Permissive dynamic information flow analysis publication-title: Proc. ACM workshop on programming languages and analysis for security (PIAS) – start-page: 193 year: 2008 end-page: 205 ident: bib27 article-title: Quantitative information flow as network flow capacity publication-title: Proc. ACM SIGPLAN conference on programming language design and implementation – volume: vol. 3672 start-page: 352 year: Sept. 2005 end-page: 367 ident: bib44 article-title: Secure information flow as a safety problem publication-title: Proc. Symp. on static analysis – year: 1993 ident: bib50 article-title: The formal semantics of programming languages: an introduction – volume: vol. 4435 year: 2006 ident: bib19 article-title: Automata-based confidentiality monitoring publication-title: Proc. Asian computing science conference (ASIAN’06) – year: Feb. 2007 ident: bib46 article-title: Crosssite scripting prevention with dynamic data tainting and static analysis publication-title: Proc. network and distributed system security symposium – reference: ANTLR Parser Generator. – volume: 1 start-page: 11 year: 2007 ident: bib33 article-title: Browsershield: vulnerability-driven filtering of dynamic html publication-title: ACM Trans Web – volume: vol. 2000 start-page: 86 year: 2000 end-page: 101 ident: bib40 article-title: A language-based approach to security publication-title: Informatics—10 years back, 10 years ahead – year: July 2010 ident: bib35 article-title: Dynamic vs. static flow-sensitive security analysis publication-title: Proc. IEEE computer security foundations symposium – start-page: 11 year: Apr. 1982 end-page: 20 ident: bib14 article-title: Security policies and security models publication-title: Proc. IEEE Symp. on security and privacy – year: June 2009 ident: bib38 article-title: From dynamic to static and back: riding the roller coaster of information-flow control research publication-title: Proc. Andrei Ershov international conference on perspectives of system informatics, LNCS – year: 2010 ident: bib25 article-title: Inlined security monitor performance test – year: July 2003 ident: bib42 article-title: The flow caml system. Software release – year: 2009 ident: bib23 article-title: Isolating javascript with filters, rewriting, and wrappers publication-title: Proc. of ESORICS’09. LNCS – volume: 17 start-page: 143 year: May 1974 end-page: 147 ident: bib13 article-title: Memoryless subsystems publication-title: Comput J – volume: 3 start-page: 30 year: 2000 end-page: 50 ident: bib39 article-title: Enforceable security policies publication-title: ACM Trans Inf Syst Security – start-page: 332 year: Dec. 2006 end-page: 351 ident: bib45 article-title: Provably correct runtime enforcement of non-interference properties publication-title: Proc. International conference on information and communications security – volume: vol. 1672 start-page: 284 year: Sept. 1999 end-page: 298 ident: bib17 article-title: Language-based security publication-title: Proc. Mathematical foundations of computer science – reference: ; 2011. – year: July 2009 ident: bib34 article-title: Securing timeout instructions in web applications publication-title: Proc. IEEE computer security foundations symposium – year: June 2011 ident: bib30 article-title: Static analysis for efficient hybrid information-flow control publication-title: In Proc. IEEE computer security foundations symposium – volume: 20 start-page: 504 year: July 1977 end-page: 513 ident: bib9 article-title: Certification of programs for secure information flow publication-title: Comm ACM – year: June 2009 ident: bib3 article-title: Efficient purely-dynamic information flow analysis publication-title: Proc. ACM workshop on programming languages and analysis for security (PIAS) – start-page: 297 year: 1978 end-page: 335 ident: bib7 article-title: Information transmission in sequential programs publication-title: Foundations of secure computation – year: 2009 ident: bib8 article-title: Making javascript safe for advertising – reference: Opera, User JavaScript. – year: 2009 ident: bib22 article-title: Language-based isolation of untrusted Javascript. In Proc. of CSF’09 – volume: 30 start-page: 235 year: 2003 end-page: 269 ident: bib20 article-title: Java bytecode verification: algorithms and formalizations publication-title: J Automated Reasoning – year: July 2001 ident: bib31 article-title: Jif: java information flow. Software release – volume: vol. 1694 start-page: 303 year: Sept. 1999 end-page: 311 ident: bib47 article-title: Safety versus secrecy publication-title: Proc. symp. on static analysis – volume: 9 start-page: 341 year: Oct. 2000 end-page: 378 ident: bib49 article-title: The security architecture formerly known as stack inspection: a security mechanism for language-based systems publication-title: ACM Trans Software Eng Methodol – start-page: 218 year: July 2007 end-page: 232 ident: bib18 article-title: Automaton-based confidentiality monitoring of concurrent programs publication-title: Proc. IEEE computer security foundations symposium – volume: 21 start-page: 5 year: Jan. 2003 end-page: 19 ident: bib37 article-title: Language-based information-flow security publication-title: IEEE J Selected Areas Commun – start-page: 79 year: May 1994 end-page: 93 ident: bib28 article-title: A general theory of composition for trace sets closed under selective interleaving functions publication-title: Proc. IEEE symp. on security and privacy – year: Oct. 2009 ident: bib10 article-title: Flowsafe: information flow security for the browser – start-page: 203 year: July 2007 end-page: 217 ident: bib41 article-title: Dynamic dependency monitoring to secure information flow publication-title: Proc. IEEE computer security foundations symposium – year: July 2009 ident: bib2 article-title: Tight enforcement of information-release policies for dynamic languages publication-title: Proc. IEEE computer security foundations symposium – year: Sept. 2010 ident: bib26 article-title: On-the-fly inlining of dynamic security monitors publication-title: Proceedings of the IFIP international information security conference (SEC) – start-page: 40 year: May 2004 end-page: 52 ident: bib16 article-title: Securing web application code by static analysis and runtime protection publication-title: Proc. International conference on World Wide Web – volume: 4 start-page: 2 year: 2005 end-page: 16 ident: bib21 article-title: Edit automata: enforcement mechanisms for run-time security policies publication-title: Int J Inf Security – year: July 2010 ident: bib6 article-title: Information flow monitor inlining publication-title: Proc. IEEE computer security foundations symposium – year: Sept. 2009 ident: bib36 article-title: Tracking information flow in dynamic tree structures publication-title: Proc. European Symp. on research in computer security, LNCS – volume: 4 start-page: 167 year: 1996 end-page: 187 ident: bib48 article-title: A sound type system for secure flow analysis publication-title: J Comput Security – start-page: 20 year: Mar. 2009 end-page: 34 ident: bib5 article-title: Secure information flow as a safety property publication-title: Formal aspects in security and trust, third international workshop (FAST’08), LNCS – volume: vol. 3672 start-page: 352 year: 2005 ident: 10.1016/j.cose.2011.10.002_bib44 article-title: Secure information flow as a safety problem – ident: 10.1016/j.cose.2011.10.002_bib11 – volume: 17 start-page: 143 issue: 2 year: 1974 ident: 10.1016/j.cose.2011.10.002_bib13 article-title: Memoryless subsystems publication-title: Comput J doi: 10.1093/comjnl/17.2.143 – start-page: 20 year: 2009 ident: 10.1016/j.cose.2011.10.002_bib5 article-title: Secure information flow as a safety property – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib8 – year: 1993 ident: 10.1016/j.cose.2011.10.002_bib50 – volume: vol. 4435 year: 2006 ident: 10.1016/j.cose.2011.10.002_bib19 article-title: Automata-based confidentiality monitoring – start-page: 11 year: 1982 ident: 10.1016/j.cose.2011.10.002_bib14 article-title: Security policies and security models – volume: 1 start-page: 11 issue: 3 year: 2007 ident: 10.1016/j.cose.2011.10.002_bib33 article-title: Browsershield: vulnerability-driven filtering of dynamic html publication-title: ACM Trans Web doi: 10.1145/1281480.1281481 – start-page: 193 year: 2008 ident: 10.1016/j.cose.2011.10.002_bib27 article-title: Quantitative information flow as network flow capacity – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib2 article-title: Tight enforcement of information-release policies for dynamic languages – volume: 4 start-page: 2 year: 2005 ident: 10.1016/j.cose.2011.10.002_bib21 article-title: Edit automata: enforcement mechanisms for run-time security policies publication-title: Int J Inf Security doi: 10.1007/s10207-004-0046-8 – year: 2007 ident: 10.1016/j.cose.2011.10.002_bib46 article-title: Crosssite scripting prevention with dynamic data tainting and static analysis – volume: vol. 1672 start-page: 284 year: 1999 ident: 10.1016/j.cose.2011.10.002_bib17 article-title: Language-based security – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib36 article-title: Tracking information flow in dynamic tree structures – volume: 4 start-page: 167 issue: 3 year: 1996 ident: 10.1016/j.cose.2011.10.002_bib48 article-title: A sound type system for secure flow analysis publication-title: J Comput Security doi: 10.3233/JCS-1996-42-304 – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib34 article-title: Securing timeout instructions in web applications – volume: vol. 1694 start-page: 303 year: 1999 ident: 10.1016/j.cose.2011.10.002_bib47 article-title: Safety versus secrecy – start-page: 332 year: 2006 ident: 10.1016/j.cose.2011.10.002_bib45 article-title: Provably correct runtime enforcement of non-interference properties – start-page: 218 year: 2007 ident: 10.1016/j.cose.2011.10.002_bib18 article-title: Automaton-based confidentiality monitoring of concurrent programs – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib38 article-title: From dynamic to static and back: riding the roller coaster of information-flow control research – volume: 30 start-page: 235 issue: 3−4 year: 2003 ident: 10.1016/j.cose.2011.10.002_bib20 article-title: Java bytecode verification: algorithms and formalizations publication-title: J Automated Reasoning doi: 10.1023/A:1025055424017 – ident: 10.1016/j.cose.2011.10.002_bib32 – start-page: 297 year: 1978 ident: 10.1016/j.cose.2011.10.002_bib7 article-title: Information transmission in sequential programs – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib26 article-title: On-the-fly inlining of dynamic security monitors – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib24 article-title: A lattice-based approach to mashup security – volume: vol. 2000 start-page: 86 year: 2000 ident: 10.1016/j.cose.2011.10.002_bib40 article-title: A language-based approach to security – ident: 10.1016/j.cose.2011.10.002_bib1 – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib10 – volume: 28 start-page: 175 issue: 1 year: 2006 ident: 10.1016/j.cose.2011.10.002_bib15 article-title: Computability classes for enforcement mechanisms publication-title: ACM TOPLAS doi: 10.1145/1111596.1111601 – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib6 article-title: Information flow monitor inlining – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib35 article-title: Dynamic vs. static flow-sensitive security analysis – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib12 – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib3 article-title: Efficient purely-dynamic information flow analysis – volume: 20 start-page: 504 issue: 7 year: 1977 ident: 10.1016/j.cose.2011.10.002_bib9 article-title: Certification of programs for secure information flow publication-title: Comm ACM doi: 10.1145/359636.359712 – year: 2001 ident: 10.1016/j.cose.2011.10.002_bib31 – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib23 article-title: Isolating javascript with filters, rewriting, and wrappers – year: 2009 ident: 10.1016/j.cose.2011.10.002_bib22 – start-page: 79 year: 1994 ident: 10.1016/j.cose.2011.10.002_bib28 article-title: A general theory of composition for trace sets closed under selective interleaving functions – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib4 article-title: Permissive dynamic information flow analysis – year: 2011 ident: 10.1016/j.cose.2011.10.002_bib30 article-title: Static analysis for efficient hybrid information-flow control – start-page: 40 year: 2004 ident: 10.1016/j.cose.2011.10.002_bib16 article-title: Securing web application code by static analysis and runtime protection – start-page: 203 year: 2007 ident: 10.1016/j.cose.2011.10.002_bib41 article-title: Dynamic dependency monitoring to secure information flow – year: 2008 ident: 10.1016/j.cose.2011.10.002_bib29 – year: 2003 ident: 10.1016/j.cose.2011.10.002_bib42 – volume: 3 start-page: 30 issue: 1 year: 2000 ident: 10.1016/j.cose.2011.10.002_bib39 article-title: Enforceable security policies publication-title: ACM Trans Inf Syst Security doi: 10.1145/353323.353382 – volume: 9 start-page: 341 issue: 4 year: 2000 ident: 10.1016/j.cose.2011.10.002_bib49 article-title: The security architecture formerly known as stack inspection: a security mechanism for language-based systems publication-title: ACM Trans Software Eng Methodol doi: 10.1145/363516.363520 – volume: 24 start-page: 39 issue: 4 year: 2004 ident: 10.1016/j.cose.2011.10.002_bib43 article-title: Enforcing security and safety models with an information flow analysis tool publication-title: ACM SIGAda Ada Letters doi: 10.1145/1046191.1032305 – year: 2010 ident: 10.1016/j.cose.2011.10.002_bib25 – volume: 21 start-page: 5 issue: 1 year: 2003 ident: 10.1016/j.cose.2011.10.002_bib37 article-title: Language-based information-flow security publication-title: IEEE J Selected Areas Commun doi: 10.1109/JSAC.2002.806121 |
| SSID | ssj0017688 |
| Score | 2.099189 |
| Snippet | How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize the security of the underlying application? Language-based... |
| SourceID | swepub proquest crossref elsevier |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 827 |
| SubjectTerms | Codes Data integrity Information Information flow Information management Information sharing Inlining Language Language-based security Non-interference Programming languages Reference monitors Security Software Studies |
| Title | On-the-fly inlining of dynamic security monitors |
| URI | https://dx.doi.org/10.1016/j.cose.2011.10.002 https://www.proquest.com/docview/1112233809 https://research.chalmers.se/publication/148773 |
| Volume | 31 |
| WOSCitedRecordID | wos000311021100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKLgcuvBGFBeXAnqpUjpPG7rGCVoBWXaTtSr1ZdmJrW3XT7qZd7R_gfzN-pQFEBQcuUZXmZc94_Hk88w1CH0SqAdmTIk4SAQuUEsac1FjFGcEyzWCkl0rbYhN0OmXz-fBbp_M95MLcrWhVsfv74ea_ihrOgbBN6uw_iLt5KJyA3yB0OILY4fhXgj-vYgB1sV6ZjL6Vrf9gEGHpSs_3al-wrndtR7PfzAlcBb7GQ201Ily691pbMurFrg5-91agPLTKJ8wshSFBaFw3QqqV9nWwbfjkou1pSEgTs-bdXyEF5kLd7NYL0bvoj9qeSUOgjh1tZl85a8ooiXOCWdvceqPv1Iq2bCdzJAG_2XTnXlj2TQC_41y14XhkP4OFXfvpOZ9cnp3x2Xg--_lfO2GbpN88M-xAp-lkcxOb0mNmi_40_eTU4AE6JnQwBPt-PPoynn9ttqNgTcYaknhoo8--coGCv37XnxBOewXTZqW1SGb2FD32S5Bo5FTnGeqo6jl6EkQfeWv_AuG9JkVBk6K1jrwmRUE9oqBJL9HlZDz7-Dn2BTbiAlqxjQdYs5ImRZ5hUiS4pExluGBlXqaFEGqgWU5h-OYYMLPWWjCZEKUEVWb3LpMqfYWOqnWlXqNIW6CXaSEB9OlBLhQRmRB0qJVBlLqLktApvPDs86YIyoqHMMMlNx3JTUeac9CRXdRr7tk47pWDVw9CX3OPHh0q5KBIB-87CYLhfhjXZl0MuDlleNhFZ05YzScYQnbPxHXFiytb5qjm8FBY62RC5iknigpukDGXTFJewLwoSyFkUiZvDr_tLXq0H3kn6Gh7u1Pv0MPibruob997tfwBwnuxZg |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On-the-fly+inlining+of+dynamic+security+monitors&rft.jtitle=Computers+%26+security&rft.au=Magazinius%2C+Jonas&rft.au=Russo%2C+Alejandro&rft.au=Sabelfeld%2C+Andrei&rft.date=2012-10-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=31&rft.issue=7&rft.spage=827&rft_id=info:doi/10.1016%2Fj.cose.2011.10.002&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2789641691 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |