default search action
Search dblp for Publications
export results for "stream:conf/plas-ws:"
@inproceedings{DBLP:conf/ccs/BenitezCR20, author = {Sergio Benitez and Jonathan Cogan and Alejandro Russo}, editor = {Alley Stoughton and Marco Vassena}, title = {Short Paper: Blockcheck the Typechain}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {35--39}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417600}, doi = {10.1145/3411506.3417600}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BenitezCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Blazy20, author = {Sandrine Blazy}, editor = {Alley Stoughton and Marco Vassena}, title = {From Verified Compilation to Secure Compilation: a Semantic Approach}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417601}, doi = {10.1145/3411506.3417601}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Blazy20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GissurarsonM20, author = {Matth{\'{\i}}as P{\'{a}}ll Gissurarson and Agust{\'{\i}}n Mista}, editor = {Alley Stoughton and Marco Vassena}, title = {Short Paper: Weak Runtime-Irrelevant Typing for Security}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {13--17}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417595}, doi = {10.1145/3411506.3417595}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GissurarsonM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LabellCF20, author = {Lauren Labell and Jared Chandler and Kathleen Fisher}, editor = {Alley Stoughton and Marco Vassena}, title = {Automatic Discovery and Synthesis of Checksum Algorithms from Binary Data Samples}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {25--34}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417599}, doi = {10.1145/3411506.3417599}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LabellCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MorioJVK20, author = {Kevin Morio and Dennis Jackson and Marco Vassena and Robert K{\"{u}}nnemann}, editor = {Alley Stoughton and Marco Vassena}, title = {Short Paper: Modular Black-box Runtime Verification of Security Protocols}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {19--22}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417596}, doi = {10.1145/3411506.3417596}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MorioJVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PankovaJ20, author = {Alisa Pankova and Joosep J{\"{a}}{\"{a}}ger}, editor = {Alley Stoughton and Marco Vassena}, title = {Short Paper: Secure Multiparty Logic Programming}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {3--7}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417597}, doi = {10.1145/3411506.3417597}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PankovaJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SweetD020, author = {Ian Sweet and David Darais and Michael Hicks}, editor = {Alley Stoughton and Marco Vassena}, title = {Short Paper: Probabilistically Almost-Oblivious Computation}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {9--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417598}, doi = {10.1145/3411506.3417598}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SweetD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yang20, author = {Jean Yang}, editor = {Alley Stoughton and Marco Vassena}, title = {How APIs Are Both the Illness and the Cure: The Software Heterogeneity Problem in Modern Web Applications}, booktitle = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, pages = {23}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506.3417602}, doi = {10.1145/3411506.3417602}, timestamp = {Sun, 20 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Yang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020plas, editor = {Alley Stoughton and Marco Vassena}, title = {PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, Virtual Event, USA, 13 November, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411506}, doi = {10.1145/3411506}, isbn = {978-1-4503-8092-8}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CeragioliDG19, author = {Lorenzo Ceragioli and Pierpaolo Degano and Letterio Galletta}, editor = {Piotr Mardziel and Niki Vazou}, title = {Are All Firewall Systems Equally Powerful?}, booktitle = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, pages = {1--17}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504.3357340}, doi = {10.1145/3338504.3357340}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CeragioliDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CortinasV19, author = {Carlos {Tom{'{e}} Corti{~{n}}as} and Nachiappan Valliappan}, editor = {Piotr Mardziel and Niki Vazou}, title = {Simple Noninterference by Normalization}, booktitle = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, pages = {61--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504.3357342}, doi = {10.1145/3338504.3357342}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CortinasV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JordanGHZ19, author = {Alexander Jordan and Fran{\c{c}}ois Gauthier and Behnaz Hassanshahi and David Zhao}, editor = {Piotr Mardziel and Niki Vazou}, title = {Unacceptable Behavior: Robust {PDF} Malware Detection Using Abstract Interpretation}, booktitle = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, pages = {19--30}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504.3357341}, doi = {10.1145/3338504.3357341}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JordanGHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaneLCSL19, author = {Christopher Kane and Bo Lin and Saksham Chand and Scott D. Stoller and Yanhong A. Liu}, editor = {Piotr Mardziel and Niki Vazou}, title = {High-Level Cryptographic Abstractions}, booktitle = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, pages = {31--43}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504.3357343}, doi = {10.1145/3338504.3357343}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaneLCSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StaicuSBPS19, author = {Cristian{-}Alexandru Staicu and Daniel Schoepe and Musard Balliu and Michael Pradel and Andrei Sabelfeld}, editor = {Piotr Mardziel and Niki Vazou}, title = {An Empirical Study of Information Flows in Real-World JavaScript}, booktitle = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, pages = {45--59}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504.3357339}, doi = {10.1145/3338504.3357339}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StaicuSBPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019plas, editor = {Piotr Mardziel and Niki Vazou}, title = {Proceedings of the 14th {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security, {CCS} 2019, London, United Kingdom, November 11-15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338504}, doi = {10.1145/3338504}, isbn = {978-1-4503-6836-0}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Algehed18, author = {Maximilian Algehed}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {A Perspective on the Dependency Core Calculus}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {24--28}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264823}, doi = {10.1145/3264820.3264823}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Algehed18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BastysPS18, author = {Iulia Bastys and Frank Piessens and Andrei Sabelfeld}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Prudent Design Principles for Information Flow Control}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {17--23}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264824}, doi = {10.1145/3264820.3264824}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BastysPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BessonDJ18, author = {Fr{\'{e}}d{\'{e}}ric Besson and Alexandre Dang and Thomas P. Jensen}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Securing Compilation Against Memory Probing}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {29--40}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264822}, doi = {10.1145/3264820.3264822}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BessonDJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Foster18, author = {Nate Foster}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Network Verification: Successes, Challenges, and Opportunities}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {41}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264828}, doi = {10.1145/3264820.3264828}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Foster18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gaboardi18, author = {Marco Gaboardi}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Formal Verification of Differential Privacy}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264829}, doi = {10.1145/3264820.3264829}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gaboardi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IzumidaMH18, author = {Tomonori Izumida and Akira Mori and Masatomo Hashimoto}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary Code}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {48--53}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264826}, doi = {10.1145/3264820.3264826}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IzumidaMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KacemP18, author = {Lefki Kacem and Catuscia Palamidessi}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Geometric Noise for Locally Private Counting Queries}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {13--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264827}, doi = {10.1145/3264820.3264827}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KacemP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaudPR18, author = {Peeter Laud and Martin Pettai and Jaak Randmets}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Sensitivity Analysis of {SQL} Queries}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2--12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264825}, doi = {10.1145/3264820.3264825}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaudPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShalevP18, author = {Noam Shalev and Nimrod Partush}, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Binary Similarity Detection Using Machine Learning}, booktitle = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {42--47}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264820.3264821}, doi = {10.1145/3264820.3264821}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShalevP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018plas, editor = {M{\'{a}}rio S. Alvim and St{\'{e}}phanie Delaune}, title = {Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3264820}, isbn = {978-1-4503-5993-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlgehedR17, author = {Maximilian Algehed and Alejandro Russo}, title = {Encoding {DCC} in Haskell}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {77--89}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139338}, doi = {10.1145/3139337.3139338}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlgehedR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CabonS17, author = {Gurvan Cabon and Alan Schmitt}, title = {Annotated Multisemantics To Prove Non-Interference Analyses}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {49--62}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139344}, doi = {10.1145/3139337.3139344}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CabonS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chong17, author = {Stephen Chong}, title = {Authorization Contracts}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {75}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139348}, doi = {10.1145/3139337.3139348}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chong17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrutterM17, author = {Samuel Gr{\"{u}}tter and Toby C. Murray}, title = {Short Paper: Towards Information Flow Reasoning about Real-World {C} Code}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {43--48}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139345}, doi = {10.1145/3139337.3139345}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrutterM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hicks17, author = {Michael Hicks}, title = {Languages for Oblivious Computation}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139349}, doi = {10.1145/3139337.3139349}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hicks17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LimGN17, author = {Jay P. Lim and Vinod Ganapathy and Santosh Nagarakatte}, title = {Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch?}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {37--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139343}, doi = {10.1145/3139337.3139343}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LimGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McCallLJ17, author = {McKenna McCall and Lay Kuan Loh and Limin Jia}, title = {A Sequent Calculus for Counterfactual Reasoning}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {91--106}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139342}, doi = {10.1145/3139337.3139342}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/McCallLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MorrisMO17, author = {Eric Rothstein Morris and Carlos G. Murguia and Mart{\'{\i}}n Ochoa}, title = {Design-time Quantification of Integrity in Cyber-physical Systems}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {63--74}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139347}, doi = {10.1145/3139337.3139347}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MorrisMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OConnor17, author = {Russell O'Connor}, title = {Simplicity: {A} New Language for Blockchains}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {107--120}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139340}, doi = {10.1145/3139337.3139340}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OConnor17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RepelKC17, author = {Dusan Repel and Johannes Kinder and Lorenzo Cavallaro}, title = {Modular Synthesis of Heap Exploits}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {25--35}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139346}, doi = {10.1145/3139337.3139346}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RepelKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaojiAF17, author = {Tejas Saoji and Thomas H. Austin and Cormac Flanagan}, title = {Using Precise Taint Tracking for Auto-sanitization}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {15--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139341}, doi = {10.1145/3139337.3139341}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SaojiAF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanJ17, author = {Gang Tan and Trent Jaeger}, title = {{CFG} Construction Soundness in Control-Flow Integrity}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {3--13}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139339}, doi = {10.1145/3139337.3139339}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TanJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017plas, title = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3139337}, isbn = {978-1-4503-5099-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Amir-Mohammadian16, author = {Sepehr Amir{-}Mohammadian and Christian Skalka}, editor = {Toby C. Murray and Deian Stefan}, title = {In-Depth Enforcement of Dynamic Integrity Taint Analysis}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {43--56}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993610}, doi = {10.1145/2993600.2993610}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Amir-Mohammadian16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Benitez16, author = {Sergio Benitez}, editor = {Toby C. Murray and Deian Stefan}, title = {Short Paper: Rusty Types for Solid Safety}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {69--75}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993604}, doi = {10.1145/2993600.2993604}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Benitez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhargavanDFGGKK16, author = {Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and C{\'{e}}dric Fournet and Anitha Gollamudi and Georges Gonthier and Nadim Kobeissi and Natalia Kulatova and Aseem Rastogi and Thomas Sibut{-}Pinote and Nikhil Swamy and Santiago Zanella B{\'{e}}guelin}, editor = {Toby C. Murray and Deian Stefan}, title = {Formal Verification of Smart Contracts: Short Paper}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {91--96}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993611}, doi = {10.1145/2993600.2993611}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhargavanDFGGKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bielova16, author = {Nataliia Bielova}, editor = {Toby C. Murray and Deian Stefan}, title = {Short Paper: Dynamic leakage: {A} Need for a New Quantitative Information Flow Measure}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {83--88}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993607}, doi = {10.1145/2993600.2993607}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bielova16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Brown16, author = {Fraser Brown}, editor = {Toby C. Murray and Deian Stefan}, title = {Short Paper: Superhacks: Exploring and Preventing Vulnerabilities in Browser Binding Code}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {103--109}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993602}, doi = {10.1145/2993600.2993602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Brown16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chaudhuri16, author = {Avik Chaudhuri}, editor = {Toby C. Murray and Deian Stefan}, title = {Flow: Abstract Interpretation of JavaScript for Type Checking and Beyond}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2996280}, doi = {10.1145/2993600.2996280}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chaudhuri16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Fournet16, author = {C{\'{e}}dric Fournet}, editor = {Toby C. Murray and Deian Stefan}, title = {Verified Secure Implementations for the {HTTPS} Ecosystem: Invited Talk}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {89}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2996279}, doi = {10.1145/2993600.2996279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Fournet16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiNN16, author = {Ximeng Li and Flemming Nielson and Hanne Riis Nielson}, editor = {Toby C. Murray and Deian Stefan}, title = {Future-dependent Flow Policies with Prophetic Variables}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {29--42}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993603}, doi = {10.1145/2993600.2993603}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Meng16, author = {Ziyuan Meng}, editor = {Toby C. Murray and Deian Stefan}, title = {Short Paper: Bounding Information Leakage Using Implication Graph}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {77--82}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993605}, doi = {10.1145/2993600.2993605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Meng16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NandiE16, author = {Chandrakana Nandi and Michael D. Ernst}, editor = {Toby C. Murray and Deian Stefan}, title = {Automatic Trigger Generation for Rule-based Smart Homes}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {97--102}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993601}, doi = {10.1145/2993600.2993601}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NandiE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NicolaySR16, author = {Jens Nicolay and Valentijn Spruyt and Coen De Roover}, editor = {Toby C. Murray and Deian Stefan}, title = {Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {3--13}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993612}, doi = {10.1145/2993600.2993612}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NicolaySR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SteinhauserG16, author = {Anton{\'{\i}}n Steinhauser and Fran{\c{c}}ois Gauthier}, editor = {Toby C. Murray and Deian Stefan}, title = {JSPChecker: Static Detection of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {57--68}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993606}, doi = {10.1145/2993600.2993606}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SteinhauserG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VassenaR16, author = {Marco Vassena and Alejandro Russo}, editor = {Toby C. Murray and Deian Stefan}, title = {On Formalizing Information-Flow Control Libraries}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {15--28}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600.2993608}, doi = {10.1145/2993600.2993608}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VassenaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016plas, editor = {Toby C. Murray and Deian Stefan}, title = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600}, doi = {10.1145/2993600}, isbn = {978-1-4503-4574-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BuirasD15, author = {Pablo Buiras and Bart van Delft}, editor = {Michael Clarkson and Limin Jia}, title = {Dynamic Enforcement of Dynamic Policies}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {28--41}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786563}, doi = {10.1145/2786558.2786563}, timestamp = {Tue, 18 Aug 2020 09:27:35 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/BuirasD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/DrossopoulouNM15, author = {Sophia Drossopoulou and James Noble and Mark S. Miller}, editor = {Michael Clarkson and Limin Jia}, title = {Swapsies on the Internet: First Steps towards Reasoning about Risk and Trust in an Open World}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {2--15}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786564}, doi = {10.1145/2786558.2786564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/DrossopoulouNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/GaneshBO15, author = {Vijay Ganesh and Sebastian Banescu and Mart{\'{\i}}n Ochoa}, editor = {Michael Clarkson and Limin Jia}, title = {Short Paper: The Meaning of Attack-Resistant Systems}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {49--55}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786562}, doi = {10.1145/2786558.2786562}, timestamp = {Thu, 27 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/GaneshBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/GrimmerSSWM15, author = {Matthias Grimmer and Roland Schatz and Chris Seaton and Thomas W{\"{u}}rthinger and Hanspeter M{\"{o}}ssenb{\"{o}}ck}, editor = {Michael Clarkson and Limin Jia}, title = {Memory-safe Execution of {C} on a Java {VM}}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {16--27}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786565}, doi = {10.1145/2786558.2786565}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/GrimmerSSWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Hritcu15, author = {Catalin Hritcu}, editor = {Michael Clarkson and Limin Jia}, title = {Micro-Policies: Formally Verified, Tag-Based Security Monitors}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786560}, doi = {10.1145/2786558.2786560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/Hritcu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Krishnamurthi15, author = {Shriram Krishnamurthi}, editor = {Michael Clarkson and Limin Jia}, title = {Tierless Programming and Reasoning for Networks}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786559}, doi = {10.1145/2786558.2786559}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/Krishnamurthi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Murray15, author = {Toby C. Murray}, editor = {Michael Clarkson and Limin Jia}, title = {Short Paper: On High-Assurance Information-Flow-Secure Programming Languages}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {43--48}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786561}, doi = {10.1145/2786558.2786561}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/Murray15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecoop/2015plas, editor = {Michael Clarkson and Limin Jia}, title = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558}, doi = {10.1145/2786558}, isbn = {978-1-4503-3661-1}, timestamp = {Tue, 18 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/2015plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BichhawatRGH14, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, editor = {Alejandro Russo and Omer Tripp}, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {15}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637116}, doi = {10.1145/2637113.2637116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/BichhawatRGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BogdanovLR14, author = {Dan Bogdanov and Peeter Laud and Jaak Randmets}, editor = {Alejandro Russo and Omer Tripp}, title = {Domain-Polymorphic Programming of Privacy-Preserving Applications}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {53}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637119}, doi = {10.1145/2637113.2637119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/BogdanovLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BrobergDS14, author = {Niklas Broberg and Bart van Delft and David Sands}, editor = {Alejandro Russo and Omer Tripp}, title = {Paragon: Programming with Information Flow Control (Demo)}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {79}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637122}, doi = {10.1145/2637113.2637122}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/BrobergDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Dolby14, author = {Julian Dolby}, editor = {Alejandro Russo and Omer Tripp}, title = {To Dream the Impossible Dream: Toward Security Analysis for JavaScript}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2639514}, doi = {10.1145/2637113.2639514}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/Dolby14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/LarmuseauPC14, author = {Adriaan Larmuseau and Marco Patrignani and Dave Clarke}, editor = {Alejandro Russo and Omer Tripp}, title = {Operational Semantics for Secure Interoperation}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637118}, doi = {10.1145/2637113.2637118}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/LarmuseauPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/StefanM14, author = {Deian Stefan and David Mazi{\`{e}}res}, editor = {Alejandro Russo and Omer Tripp}, title = {Building Secure Systems with {LIO} (Demo)}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637121}, doi = {10.1145/2637113.2637121}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/StefanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/StoughtonJBCCFZ14, author = {Alley Stoughton and Andrew Johnson and Samuel Beller and Karishma Chadha and Dennis Chen and Kenneth Foner and Michael Zhivich}, editor = {Alejandro Russo and Omer Tripp}, title = {You Sank My Battleship!: {A} Case Study in Secure Programming}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637115}, doi = {10.1145/2637113.2637115}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/StoughtonJBCCFZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/ZanariniJ14, author = {Dante Zanarini and Mauro Jaskelioff}, editor = {Alejandro Russo and Omer Tripp}, title = {Monitoring Reactive Systems with Dynamic Channels}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {66}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637120}, doi = {10.1145/2637113.2637120}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/ZanariniJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/ZhengM14, author = {Lantian Zheng and Andrew C. Myers}, editor = {Alejandro Russo and Omer Tripp}, title = {A Language-Based Approach to Secure Quorum Replication}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {27}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637117}, doi = {10.1145/2637113.2637117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/ZhengM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecoop/2014plas, editor = {Alejandro Russo and Omer Tripp}, title = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2637113}, isbn = {978-1-4503-2862-3}, timestamp = {Thu, 20 Nov 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/2014plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/0001KOTRKSHC13, author = {Xun Li and Vineeth Kashyap and Jason K. Oberg and Mohit Tiwari and Vasanth Ram Rajarathinam and Ryan Kastner and Timothy Sherwood and Ben Hardekopf and Frederic T. Chong}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Position paper: Sapper - a language for provable hardware policy enforcement}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {39--44}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465214}, doi = {10.1145/2465106.2465214}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/0001KOTRKSHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/AustinYFS13, author = {Thomas H. Austin and Jean Yang and Cormac Flanagan and Armando Solar{-}Lezama}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Faceted execution of policy-agnostic programs}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {15--26}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465121}, doi = {10.1145/2465106.2465121}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/AustinYFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/GampeR13, author = {Andreas Gampe and Jeffery von Ronne}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Security completeness: towards noninterference in composed languages}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {27--38}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465122}, doi = {10.1145/2465106.2465122}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/GampeR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HallgrenMS13, author = {Per A. Hallgren and Daniel T. Mauritzson and Andrei Sabelfeld}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {GlassTube: a lightweight approach to web application integrity}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {71--82}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465432}, doi = {10.1145/2465106.2465432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HallgrenMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HinrichsRPVSZ13, author = {Timothy L. Hinrichs and Daniele Rossetti and Gabriele Petronella and V. N. Venkatakrishnan and A. Prasad Sistla and Lenore D. Zuck}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {{WEBLOG:} a declarative language for secure web development}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {59--70}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465119}, doi = {10.1145/2465106.2465119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HinrichsRPVSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/KeilT13, author = {Matthias Keil and Peter Thiemann}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Type-based dependency analysis for javascript}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {47--58}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465118}, doi = {10.1145/2465106.2465118}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/KeilT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Lester13, author = {Martin Mariusz Lester}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Position paper: the science of boxing}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {83--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465120}, doi = {10.1145/2465106.2465120}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/Lester13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/RastogiMHH13, author = {Aseem Rastogi and Piotr Mardziel and Michael Hicks and Matthew A. Hammer}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Knowledge inference for optimizing secure multi-party computation}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {3--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2465117}, doi = {10.1145/2465106.2465117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/RastogiMHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Sands13, author = {David Sands}, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Fault-tolerant non-interference: invited talk abstract}, booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465106.2489089}, doi = {10.1145/2465106.2489089}, timestamp = {Sun, 14 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/Sands13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2013plas, editor = {Prasad Naldurg and Nikhil Swamy}, title = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2465106}, isbn = {978-1-4503-2144-0}, timestamp = {Thu, 22 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2013plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BelloR12, author = {Luciano Bello and Alejandro Russo}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Towards a taint mode for cloud computing web applications}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {7}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336724}, doi = {10.1145/2336717.2336724}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/BelloR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Bodden12, author = {Eric Bodden}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Static flow-sensitive {\&} context-sensitive information-flow analysis for software product lines: position paper}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336723}, doi = {10.1145/2336717.2336723}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/Bodden12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/DoligezJR12, author = {Damien Doligez and Mathieu Jaume and Renaud Rioboo}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environment}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {9}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336726}, doi = {10.1145/2336717.2336726}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/DoligezJR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/DugganW12, author = {Dominic Duggan and Ye Wu}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Security correctness for secure nested transactions: position paper}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {4}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336721}, doi = {10.1145/2336717.2336721}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/DugganW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HernandezN12, author = {Alejandro Mario Hernandez and Flemming Nielson}, editor = {Sergio Maffeis and Tamara Rezk}, title = {A generic approach for security policies composition: position paper}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336722}, doi = {10.1145/2336717.2336722}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/HernandezN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HusseinMR12, author = {Soha Hussein and Patrick O'Neil Meredith and Grigore Rosu}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Security-policy monitoring and enforcement with JavaMOP}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {3}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336720}, doi = {10.1145/2336717.2336720}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HusseinMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LiangM12, author = {Shuying Liang and Matthew Might}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Hash-flow taint analysis of higher-order programs}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {8}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336725}, doi = {10.1145/2336717.2336725}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LiangM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MardzielHKS12, author = {Piotr Mardziel and Michael Hicks and Jonathan Katz and Mudhakar Srivatsa}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Knowledge-oriented secure multiparty computation}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336719}, doi = {10.1145/2336717.2336719}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MardzielHKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MatosS12, author = {Ana Almeida Matos and Jos{\'{e}} Fragoso Santos}, editor = {Sergio Maffeis and Tamara Rezk}, title = {Typing illegal information flows as program effects}, booktitle = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, pages = {1}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2336717.2336718}, doi = {10.1145/2336717.2336718}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MatosS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2012plas, editor = {Sergio Maffeis and Tamara Rezk}, title = {Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, {PLAS} 2012, Beijing, China, 15 June, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2336717}, isbn = {978-1-4503-1441-1}, timestamp = {Thu, 22 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2012plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BalliuDG11, author = {Musard Balliu and Mads Dam and Gurvan Le Guernic}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Epistemic temporal logic for information flow security}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166962}, doi = {10.1145/2166956.2166962}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BalliuDG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BirgissonMA11, author = {Arnar Birgisson and Frank McSherry and Mart{\'{\i}}n Abadi}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Differential privacy with information flow control}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166958}, doi = {10.1145/2166956.2166958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BirgissonMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BirgissonRS11, author = {Arnar Birgisson and Alejandro Russo and Andrei Sabelfeld}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Capabilities for information flow}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {5}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166961}, doi = {10.1145/2166956.2166961}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/BirgissonRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/GreathouseA11, author = {Joseph L. Greathouse and Todd M. Austin}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {The potential of sampling for dynamic analysis}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {3}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166959}, doi = {10.1145/2166956.2166959}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/GreathouseA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MaffeiP11, author = {Matteo Maffei and Kim Pecina}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Privacy-aware proof-carrying authorization}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {7}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166963}, doi = {10.1145/2166956.2166963}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MaffeiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MengS11, author = {Ziyuan Meng and Geoffrey Smith}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Calculating bounds on information leakage using two-bit patterns}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {1}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166957}, doi = {10.1145/2166956.2166957}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/MengS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/RafnssonS11, author = {Willard Rafnsson and Andrei Sabelfeld}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Limiting information leakage in event-based communication}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166960}, doi = {10.1145/2166956.2166960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/RafnssonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SonS11, author = {Sooel Son and Vitaly Shmatikov}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {{SAFERPHP:} finding semantic vulnerabilities in {PHP} applications}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166964}, doi = {10.1145/2166956.2166964}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/SonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2011plas, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2166956}, isbn = {978-1-4503-0830-4}, timestamp = {Thu, 22 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2011plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/0001THSC10, author = {Xun Li and Mohit Tiwari and Ben Hardekopf and Timothy Sherwood and Frederic T. Chong}, editor = {Anindya Banerjee and Deepak Garg}, title = {Secure information flow analysis for hardware design: using the right abstraction for the job}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {8}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814225}, doi = {10.1145/1814217.1814225}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/0001THSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/AustinF10, author = {Thomas H. Austin and Cormac Flanagan}, editor = {Anindya Banerjee and Deepak Garg}, title = {Permissive dynamic information flow analysis}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {3}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814220}, doi = {10.1145/1814217.1814220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/AustinF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BerthomeHKL10, author = {Pascal Berthom{\'{e}} and Karine Heydemann and Xavier Kauffmann{-}Tourkestansky and Jean{-}Fran{\c{c}}ois Lalande}, editor = {Anindya Banerjee and Deepak Garg}, title = {Attack model for verification of interval security properties for smart card {C} codes}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814219}, doi = {10.1145/1814217.1814219}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BerthomeHKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BondSMS10, author = {Michael D. Bond and Varun Srivastava and Kathryn S. McKinley and Vitaly Shmatikov}, editor = {Anindya Banerjee and Deepak Garg}, title = {Efficient, context-sensitive detection of real-world semantic attacks}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {1}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814218}, doi = {10.1145/1814217.1814218}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/BondSMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/DhawanSG10, author = {Mohan Dhawan and Chung{-}chieh Shan and Vinod Ganapathy}, editor = {Anindya Banerjee and Deepak Garg}, title = {The case for JavaScript transactions: position paper}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814223}, doi = {10.1145/1814217.1814223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/DhawanSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HassanMR10, author = {D. Hassan and Mohammad Reza Mousavi and Michel A. Reniers}, editor = {Anindya Banerjee and Deepak Garg}, title = {Restricted delegation and revocation in language-based security: (position paper)}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814222}, doi = {10.1145/1814217.1814222}, timestamp = {Sat, 11 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/HassanMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MalechaC10, author = {Gregory Malecha and Stephen Chong}, editor = {Anindya Banerjee and Deepak Garg}, title = {A more precise security type system for dynamic security tests}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {4}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814221}, doi = {10.1145/1814217.1814221}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/MalechaC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MettlerW10, author = {Adrian Mettler and David A. Wagner}, editor = {Anindya Banerjee and Deepak Garg}, title = {Class properties for security review in an object-capability subset of Java: (short paper)}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814224}, doi = {10.1145/1814217.1814224}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MettlerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2010plas, editor = {Anindya Banerjee and Deepak Garg}, title = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1814217}, isbn = {978-1-60558-827-8}, timestamp = {Thu, 22 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/2010plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BacaCL08, author = {Dejan Baca and Bengt Carlsson and Lars Lundberg}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Evaluating the cost reduction of static code analysis for software security}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {79--88}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375707}, doi = {10.1145/1375696.1375707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BacaCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ChaudhuriNR08, author = {Avik Chaudhuri and Prasad Naldurg and Sriram K. Rajamani}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A type system for data-flow integrity on windows vista}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {89--100}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375708}, doi = {10.1145/1375696.1375708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ChaudhuriNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/CheneyD08, author = {James Cheney and Morten Dahl}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Resource bound analysis for database queries}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {67--78}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375706}, doi = {10.1145/1375696.1375706}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/CheneyD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/FocardiC08, author = {Riccardo Focardi and Matteo Centenaro}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Information flow security of multi-threaded distributed programs}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {113--124}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375711}, doi = {10.1145/1375696.1375711}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/FocardiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HamlenJ08, author = {Kevin W. Hamlen and Micah Jones}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Aspect-oriented in-lined reference monitors}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375699}, doi = {10.1145/1375696.1375699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HamlenJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HammerSS08, author = {Christian Hammer and R{\"{u}}diger Schaade and Gregor Snelting}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Static path conditions for Java}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {57--66}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375704}, doi = {10.1145/1375696.1375704}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HammerSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LiemGJ08, author = {Clifford Liem and Yuan Xiang Gu and Harold Johnson}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A compiler-based infrastructure for software-protection}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {33--44}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375702}, doi = {10.1145/1375696.1375702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LiemGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MalacariaC08, author = {Pasquale Malacaria and Han Chen}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Lagrange multipliers and maximum information leakage in different observational models}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {135--146}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375713}, doi = {10.1145/1375696.1375713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MalacariaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MassacciS08, author = {Fabio Massacci and Ida Sri Rejeki Siahaan}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Simulating midlet's security claims with automata modulo theory}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {1--9}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375698}, doi = {10.1145/1375696.1375698}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MassacciS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MowbrayL08, author = {Miranda Mowbray and Antonio Lain}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Dominator-tree analysis for distributed authorization}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {101--112}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375709}, doi = {10.1145/1375696.1375709}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MowbrayL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ShafferAIL08, author = {Alan B. Shaffer and Mikhail Auguston and Cynthia E. Irvine and Timothy E. Levin}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A security domain model to assess software for exploitable covert channels}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {45--56}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375703}, doi = {10.1145/1375696.1375703}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ShafferAIL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SwamyH08, author = {Nikhil Swamy and Michael Hicks}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Verified enforcement of stateful information release policies}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {21--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375700}, doi = {10.1145/1375696.1375700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SwamyH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ZhengM08, author = {Lantian Zheng and Andrew C. Myers}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Securing nonintrusive web encryption through information flow}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {125--134}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375712}, doi = {10.1145/1375696.1375712}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ZhengM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2008plas, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-59593-936-4}, timestamp = {Mon, 16 Jun 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2008plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/AskarovS07, author = {Aslan Askarov and Andrei Sabelfeld}, editor = {Michael W. Hicks}, title = {Localized delimited release: combining the what and where dimensions of information release}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {53--60}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255339}, doi = {10.1145/1255329.1255339}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/AskarovS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BandhakaviWW07, author = {Sruthi Bandhakavi and William H. Winsborough and Marianne Winslett}, editor = {Michael W. Hicks}, title = {Informal presentation: a trust management perspective on managing policy updates in security-typed languages}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {73--74}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255342}, doi = {10.1145/1255329.1255342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BandhakaviWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BanerjeeNR07, author = {Anindya Banerjee and David A. Naumann and Stan Rosenberg}, editor = {Michael W. Hicks}, title = {Towards a logical account of declassification}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {61--66}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255340}, doi = {10.1145/1255329.1255340}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BanerjeeNR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/CaseM07, author = {John Case and Samuel E. Moelius}, editor = {Michael W. Hicks}, title = {Cautious virus detection in the extreme}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {47--52}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255338}, doi = {10.1145/1255329.1255338}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/CaseM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ChenM07, author = {Han Chen and Pasquale Malacaria}, editor = {Michael W. Hicks}, title = {Quantitative analysis of leakage for multi-threaded programs}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {31--40}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255335}, doi = {10.1145/1255329.1255335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ChenM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ChenW07, author = {Karl Chen and David A. Wagner}, editor = {Michael W. Hicks}, title = {Large-scale analysis of format string vulnerabilities in Debian Linux}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {75--84}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255344}, doi = {10.1145/1255329.1255344}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ChenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HicksKM07, author = {Boniface Hicks and Dave King and Patrick D. McDaniel}, editor = {Michael W. Hicks}, title = {Jifclipse: development tools for security-typed languages}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {1--10}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255331}, doi = {10.1145/1255329.1255331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HicksKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LivshitsE07, author = {V. Benjamin Livshits and {\'{U}}lfar Erlingsson}, editor = {Michael W. Hicks}, title = {Using web application construction frameworks to protect against code injection attacks}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {95--104}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255346}, doi = {10.1145/1255329.1255346}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LivshitsE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/McCamantE07, author = {Stephen McCamant and Michael D. Ernst}, editor = {Michael W. Hicks}, title = {A simulation-based proof technique for dynamic information flow}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {41--46}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255336}, doi = {10.1145/1255329.1255336}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/McCamantE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/NielsenS07, author = {Janus Dam Nielsen and Michael I. Schwartzbach}, editor = {Michael W. Hicks}, title = {A domain-specific programming language for secure multiparty computation}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {21--30}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255333}, doi = {10.1145/1255329.1255333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/NielsenS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Saidi07, author = {Hassen Sa{\"{\i}}di}, editor = {Michael W. Hicks}, title = {Guarded models for intrusion detection}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {85--94}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255345}, doi = {10.1145/1255329.1255345}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/Saidi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SmithA07, author = {Geoffrey Smith and Rafael Alp{\'{\i}}zar}, editor = {Michael W. Hicks}, title = {Fast probabilistic simulation, nontermination, and secure information flow}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {67--72}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255341}, doi = {10.1145/1255329.1255341}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/SmithA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SmithT07, author = {Scott F. Smith and Mark Thober}, editor = {Michael W. Hicks}, title = {Improving usability of information flow security in java}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {11--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255332}, doi = {10.1145/1255329.1255332}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SmithT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2007plas, editor = {Michael W. Hicks}, title = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-711-7}, timestamp = {Fri, 04 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2007plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/FraserPA06, author = {Timothy Fraser and Nick L. Petroni Jr. and William A. Arbaugh}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Applying flow-sensitive {CQUAL} to verify {MINIX} authorization check placement}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {3--6}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134747}, doi = {10.1145/1134744.1134747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/FraserPA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HamlenMS06, author = {Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Certified In-lined Reference Monitoring on .NET}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {7--16}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134748}, doi = {10.1145/1134744.1134748}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HamlenMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HicksKMH06, author = {Boniface Hicks and Dave King and Patrick D. McDaniel and Michael Hicks}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Trusted declassification: : high-level policy for a security-typed language}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {65--74}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134757}, doi = {10.1145/1134744.1134757}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HicksKMH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HristovaRLS06, author = {Katia Hristova and Tom Rothamel and Yanhong A. Liu and Scott D. Stoller}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Efficient type inference for secure information flow}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {85--94}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134759}, doi = {10.1145/1134744.1134759}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HristovaRLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/JovanovicKK06, author = {Nenad Jovanovic and Christopher Kruegel and Engin Kirda}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Precise alias analysis for static detection of web application vulnerabilities}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {27--36}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134751}, doi = {10.1145/1134744.1134751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/JovanovicKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LiuT06, author = {Michael Yanguo Liu and Issa Traor{\'{e}}}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Empirical relation between coupling and attackability in software systems: : a case study on {DOS}}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {57--64}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134756}, doi = {10.1145/1134744.1134756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LiuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LuS06, author = {Xiaoqi Lu and Scott F. Smith}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {A microkernel virtual machine: : building security with clear interfaces}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {47--56}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134754}, doi = {10.1145/1134744.1134754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LuS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/PolakowS06, author = {Jeff Polakow and Christian Skalka}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Specifying distributed trust management in LolliMon}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {37--46}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134753}, doi = {10.1145/1134744.1134753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/PolakowS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SmithT06, author = {Scott F. Smith and Mark Thober}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Refactoring programs to secure information flows}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {75--84}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134758}, doi = {10.1145/1134744.1134758}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SmithT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/UnnoKY06, author = {Hiroshi Unno and Naoki Kobayashi and Akinori Yonezawa}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Combining type-based analysis and model checking for finding counterexamples against non-interference}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {17--26}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134750}, doi = {10.1145/1134744.1134750}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/UnnoKY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Wagner06, author = {David A. Wagner}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Object capabilities for security}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {1--2}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134745}, doi = {10.1145/1134744.1134745}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/Wagner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2006plas, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-374-3}, timestamp = {Fri, 04 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2006plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.