Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security 2008
DOI: 10.1145/1368310.1368329
|View full text |Cite
|
Sign up to set email alerts
|

Secure slices of insecure programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
1

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 20 publications
0
5
0
1
Order By: Relevance
“…Various forms of dependence graphs (Program Dependence Graph (PDG), System Dependence Graph (SDG), Class Dependence Graph (ClDG), etc. [10,16,19,23]) are immensely useful, as an improvement over type-based systems, for information flow security analysis of programs [15,14,5,27,29]. In dependence graphs, program statements are represented by nodes whereas data-dependencies and control-dependencies are represented by edges.…”
Section: Leak = 5;mentioning
confidence: 99%
See 1 more Smart Citation
“…Various forms of dependence graphs (Program Dependence Graph (PDG), System Dependence Graph (SDG), Class Dependence Graph (ClDG), etc. [10,16,19,23]) are immensely useful, as an improvement over type-based systems, for information flow security analysis of programs [15,14,5,27,29]. In dependence graphs, program statements are represented by nodes whereas data-dependencies and control-dependencies are represented by edges.…”
Section: Leak = 5;mentioning
confidence: 99%
“…Some of the existing methods include backward slicing, path condition-based analysis, etc. [5,14]. A backward slice of a program with respect to a program point p and set of program variables V consists of all statements and predicates in the program that may affect the value of variables in V at p. Context-sensitivity in case of programs with procedure-calls, object-sensitivity in case of object-oriented programs are also considered in [15].…”
Section: Leak = 5;mentioning
confidence: 99%
“…They also report on a JavaScript implementation that requires a modified virtual machine. In a somewhat related line of work, Cavadini [9] proposes a technique based on program slicing to obtain secure fragments of insecure programs.…”
Section: Related Workmentioning
confidence: 99%
“…There have been a number of white-box techniques using static analysis, such as program slicing [28,30], type analysis [2,23,25], probabilistic analysis [18,20,24], and information-theoretic analysis [4,12,19], to find dependency among variables. In our recent work [16], we introduce a new information-theoretic technique that does not depend on static analysis and can be adapted to black-boxes easily as shown in [16].…”
Section: Introductionmentioning
confidence: 99%