@inproceedings(corecalc, author = "M. Abadi and A. Banerjee and N. Heintze and J. Riecke", year = "1999", title = "A core calculus of dependency", booktitle = "Proc.\ of the 26th Annual ACM SIGPLAN-SIGACT Symp.\ on Principles of Programming Languages (POPL~'99)", publisher = "ACM-Press", pages = "147--160", doi = "10.1145/292540.292555", ) @inproceedings(AS07, author = "A. Askarov and A. Sabelfeld", year = "2007", title = "Gradual Release: Unifying Declassification, Encryption and Key Release Policies", booktitle = "Proc.\ IEEE Symp.\ on Security and Privacy", publisher = "IEEE Comp.\ Soc.\ Press", pages = "207--221", doi = "10.1109/SP.2007.22", ) @inproceedings(BDG12, author = "M. Balliu and M. Dam and G. Le Guernic", year = "2011", title = "Epistemic Temporal Logic for Information Flow Security", booktitle = "Proc. of the 2011 workshop on Programming languages and analysis for security", publisher = "ACM Press", doi = "10.1145/2166956.2166962", ) @article(MB10, author = "M. Balliu and I. Mastroeni", year = "2010", title = "A Weakest Precondition Approach to Robustness", journal = "LNCS Transactions on Computational Science", volume = "10", pages = "261 -- 297", doi = "10.1007/978-3-642-17499-5\_11", ) @inproceedings(BGM07, author = "A. Banerjee and R. Giacobazzi and I. Mastroeni", year = "2007", title = "What you lose is what you leak: Information leakage in declassifivation policies", booktitle = "Proc.\ of the 23th Internat.\ Symp.\ on Mathematical Foundations of Programming Semantics {\rm ({\em MFPS~'07\/})}", series = "Electronic Notes in Theoretical Computer Science", volume = "1514", publisher = "Elsevier", doi = "10.1016/j.entcs.2007.02.027", ) @inproceedings(BNR08, author = "A. Banerjee and D. A. Naumann and S. Rosenberg", year = "2008", title = "Expressive Declassification Policies and Modular Static Enforcement", booktitle = "IEEE Symp. on Security and Privacy", pages = "339 -- 353", doi = "10.1109/SP.2008.20", ) @article(cohen77, author = "E. S. Cohen", year = "1977", title = "Information transmission in computational systems", journal = "ACM SIGOPS Operating System Review", volume = "11", number = "5", pages = "133--139", doi = "10.1145/1067625.806556", ) @inproceedings(CTL98, author = "C. Collberg and C. D. Thomborson and D. Low", year = "1998", title = "Manufactoring Cheap, Resilient, and Stealthy Opaque Constructs", booktitle = "Proc.\ of Conf.\ Record of the 25st ACM Symp.\ on Principles of Programming Languages {\rm ({\em POPL~'98\/})}", publisher = "ACM Press", pages = "184--196", doi = "10.1145/268946.268962", ) @article(C00tcs, author = "P. Cousot", year = "2002", title = "Constructive design of a hierarchy of semantics of a transition system by abstract interpretation", journal = "Theor.\ Comput.\ Sci.", volume = "277", number = "1-2", pages = "47--103", doi = "10.1016/S0304-3975(00)00313-3", ) @inproceedings(CC77, author = "P. Cousot and R. Cousot", year = "1977", title = "Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints", booktitle = "Conference Record of the 4th ACM Symposium on Principles of Programming Languages {\rm ({\em POPL~'77\/})}", publisher = "ACM Press", pages = "238--252", doi = "10.1145/512950.512973", ) @inproceedings(CC79, author = "P. Cousot and R. Cousot", year = "1979", title = "Systematic design of program analysis frameworks", booktitle = "Conference Record of the 6th ACM Symposium on Principles of Programming Languages {\rm ({\em POPL~'79\/})}", publisher = "ACM Press", pages = "269--282", doi = "10.1145/567752.567778", ) @article(DG09, author = "M. {Dalla Preda} and R. Giacobazzi", year = "2009", title = "Semantic-based Code Obfuscation by Abstract Interpretation", journal = "Journal of Computer Security", volume = "17", number = "6", pages = "855--908", doi = "10.1007/11523468\_107", ) @conference(DM13id, author = "M. {Dalla Preda} and I. Mastroeni", year = "2013", title = "Chasing Infections by Unveiling Program Dependencies", booktitle = "1st International Workshop on Interference and Dependence (ID '13)", ) @inproceedings(JGM12, author = "R. Giacobazzi and N. D. Jones and I. Mastroeni", year = "2012", title = "Obfuscation by Partial Evaluation of Distorted Interpreters", editor = "O. Kiselyov and S. Thompson", booktitle = "Proc. of the ACM SIGPLAN Symp. on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'12)", publisher = "ACM Press", pages = "63 -- 72", doi = "10.1145/2103746.2103761", ) @inproceedings(GM04popl, author = "R. Giacobazzi and I. Mastroeni", year = "2004", title = "Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation", booktitle = "Proc.\ of the 31st Annual ACM SIGPLAN-SIGACT Symp.\ on Principles of Programming Languages (POPL~'04)", publisher = "ACM-Press", pages = "186--197", doi = "10.1145/964001.964017", ) @article(GMadj10, author = "R. Giacobazzi and I. Mastroeni", year = "2010", title = "Adjoining classified and unclassified information by Abstract Interpretation", journal = "Journal of Computer Security", volume = "18", number = "5", pages = "751 -- 797", doi = "10.3233/JCS-2009-0382", ) @article(GMproof10, author = "R. Giacobazzi and I. Mastroeni", year = "2010", title = "A Proof System for Abstract Non-Interference", journal = "Journal of Logic and Computation", volume = "20", pages = "449 -- 479", doi = "10.1093/logcom/exp053", ) @inproceedings(GQ01, author = "R. Giacobazzi and E. Quintarelli", year = "2001", title = "Incompleteness, counterexamples and refinements in abstract model-checking", editor = "P. Cousot", booktitle = "Proc.\ of The 8th Internat.\ Static Analysis Symp.\ (SAS'01)", series = "Lecture Notes in Computer Science", volume = "2126", publisher = "Springer-Verlag", pages = "356--373", doi = "10.1007/3-540-47764-0\_20", ) @article(GRS00, author = "R. Giacobazzi and F. Ranzato and F. Scozzari.", year = "2000", title = "Making Abstract Interpretation Complete", journal = "Journal of the {ACM}", volume = "47", number = "2", pages = "361--416", doi = "10.1145/333979.333989", ) @inproceedings(goguenmes82, author = "J. A. Goguen and J. Meseguer", year = "1982", title = "Security policies and security models", booktitle = "Proc.\ IEEE Symp.\ on Security and Privacy", publisher = "IEEE Comp.\ Soc.\ Press", pages = "11--20", ) @inproceedings(HM05, author = "S. Hunt and I. Mastroeni", year = "2005", title = "The {P}{E}{R} model of Abstract Non-Interference", editor = "C. Hankin and I. Siveroni", booktitle = "Proc.\ of The 12th Internat.\ Static Analysis Symp.\ (SAS~'05)", series = "Lecture Notes in Computer Science", volume = "3672", publisher = "Springer-Verlag", pages = "171--185", doi = "10.1007/11547662\_13", ) @article(joshiLeino00, author = "R. Joshi and K. R. M. Leino", year = "2000", title = "A semantic approach to secure information flow", journal = "Science of Computer Programming", volume = "37", pages = "113--138", doi = "10.1016/S0167-6423(99)00024-6", ) @inproceedings(M2000, author = "H. Mantel", year = "2000", title = "Possibilistic definitions of security -- an assemply kit --", booktitle = "Proc.\ of the IEEE Computer Security Foundations Workshop", publisher = "IEEE Comp.\ Soc.\ Press", pages = "185--199", doi = "10.1109/CSFW.2000.856936", ) @inproceedings(M05Aplas, author = "I. Mastroeni", year = "2005", title = "On the R{\^{o}}le of Abstract Non-interference in Language-Based Security", editor = "K. Yi", booktitle = "Third Asian Symp.\ on Programming Languages and Systems (APLAS~'05)", series = "Lecture Notes in Computer Science", volume = "3780", publisher = "Springer-Verlag", pages = "418--433", doi = "10.1007/11575467\_27", ) @article(BM08, author = "I. Mastroeni and A. Banerjee", year = "2011", title = "Modelling Declassification Policies using Abstract Domain Completeness", journal = "Mathematical Structures in Computer Science", volume = "21", number = "6", pages = "1253 -- 1299", doi = "10.1017/S096012951100020X", ) @inproceedings(MN10, author = "I. Mastroeni and D. Nikolic", year = "2010", title = "An Abstract Unified Framework for (Abstract) Program Slicing", booktitle = "12th International Conference on Formal Engineering Methods, ICFEM 201", series = "{L}ecture {N}otes in {C}omputer {S}cience", volume = "6447", publisher = "Spinger-Verlag", pages = "452--467", doi = "10.1007/978-3-642-16901-4\_30", ) @inproceedings(MZ08, author = "I. Mastroeni and D. Zanardini", year = "2008", title = "Data dependencies and program slicing: From syntax to abstract semantics", booktitle = "Proc. of the ACM SIGPLAN Symp. on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'08)", publisher = "ACM Press", pages = "125 -- 134", doi = "10.1145/1328408.1328428", ) @article(ML96, author = "J. McLean", year = "1996", title = "A general theory of composition for a class of ``possibilistic'' properties", journal = "IEEE Transactions on Software Engineering", volume = "22", number = "1", pages = "53 -- 67", doi = "10.1109/32.481534", ) @manual(jif, author = "A. C. Myers and S. Chong and N. Nystrom and L. Zheng and S. Zdancewic", title = "Jif: Java information flow. Software release", url = "http://www.cs.cornell.edu/jif", ) @inproceedings(SM04, author = "A. Sabelfeld and A. C. Myers", year = "2004", title = "A model for delimited information release", editor = "N. Yonezaki K. Futatsugi, F. Mizoguchi", booktitle = "Proc.\ of the International Symp.\ on Software Security (ISSS'03)", series = "Lecture Notes in Computer Science", volume = "3233", publisher = "Springer-Verlag", pages = "174--191", doi = "10.1007/978-3-540-37621-7\_9", ) @article(SM03, author = "A. Sabelfeld and A.C. Myers", year = "2003", title = "Language-based information-flow security", journal = "{IEEE} J.\ on selected ares in communications", volume = "21", number = "1", pages = "5--19", doi = "10.1109/JSAC.2002.806121", ) @article(SS-HOSC01, author = "A. Sabelfeld and D. Sands", year = "2001", title = "A {P}{E}{R} Model of Secure Information Flow in Sequential Programs", journal = "Higher-Order and Symbolic Computation", volume = "14", number = "1", pages = "59--91", doi = "10.1023/A:1011553200337", ) @article(SSJCS07, author = "A. Sabelfeld and D. Sands", year = "2007", title = "Declassification: Dimensions and Principles", journal = "J.\ of Computer Security", doi = "10.3233/JCS-2009-0352", ) @inproceedings(NJKKV07, author = "P. Vogt and F. Nentwich and N. Jovanovic and E. Kirda and C. Kr{\"u}gel and G. Vigna", year = "2007", title = "Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis", booktitle = "NDSS", ) @inproceedings(Weiser81, author = "M. Weiser", year = "1981", title = "Program slicing", booktitle = "ICSE '81: Proceedings of the 5th international conference on Software engineering", publisher = "IEEE Press", pages = "439--449", )