Search dblp for Publications

export results for "toc:db/conf/pldi/plas2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/pldi/BacaCL08,
  author       = {Dejan Baca and
                  Bengt Carlsson and
                  Lars Lundberg},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Evaluating the cost reduction of static code analysis for software
                  security},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375707},
  doi          = {10.1145/1375696.1375707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/BacaCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ChaudhuriNR08,
  author       = {Avik Chaudhuri and
                  Prasad Naldurg and
                  Sriram K. Rajamani},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {A type system for data-flow integrity on windows vista},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375708},
  doi          = {10.1145/1375696.1375708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/ChaudhuriNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/CheneyD08,
  author       = {James Cheney and
                  Morten Dahl},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Resource bound analysis for database queries},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375706},
  doi          = {10.1145/1375696.1375706},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/CheneyD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/FocardiC08,
  author       = {Riccardo Focardi and
                  Matteo Centenaro},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Information flow security of multi-threaded distributed programs},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375711},
  doi          = {10.1145/1375696.1375711},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/FocardiC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/HamlenJ08,
  author       = {Kevin W. Hamlen and
                  Micah Jones},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Aspect-oriented in-lined reference monitors},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375699},
  doi          = {10.1145/1375696.1375699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/HamlenJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/HammerSS08,
  author       = {Christian Hammer and
                  R{\"{u}}diger Schaade and
                  Gregor Snelting},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Static path conditions for Java},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375704},
  doi          = {10.1145/1375696.1375704},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/HammerSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/LiemGJ08,
  author       = {Clifford Liem and
                  Yuan Xiang Gu and
                  Harold Johnson},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {A compiler-based infrastructure for software-protection},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375702},
  doi          = {10.1145/1375696.1375702},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/LiemGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/MalacariaC08,
  author       = {Pasquale Malacaria and
                  Han Chen},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Lagrange multipliers and maximum information leakage in different
                  observational models},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {135--146},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375713},
  doi          = {10.1145/1375696.1375713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/MalacariaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/MassacciS08,
  author       = {Fabio Massacci and
                  Ida Sri Rejeki Siahaan},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Simulating midlet's security claims with automata modulo theory},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375698},
  doi          = {10.1145/1375696.1375698},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/MassacciS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/MowbrayL08,
  author       = {Miranda Mowbray and
                  Antonio Lain},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Dominator-tree analysis for distributed authorization},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375709},
  doi          = {10.1145/1375696.1375709},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/MowbrayL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ShafferAIL08,
  author       = {Alan B. Shaffer and
                  Mikhail Auguston and
                  Cynthia E. Irvine and
                  Timothy E. Levin},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {A security domain model to assess software for exploitable covert
                  channels},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375703},
  doi          = {10.1145/1375696.1375703},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/ShafferAIL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/SwamyH08,
  author       = {Nikhil Swamy and
                  Michael Hicks},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Verified enforcement of stateful information release policies},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375700},
  doi          = {10.1145/1375696.1375700},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/SwamyH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ZhengM08,
  author       = {Lantian Zheng and
                  Andrew C. Myers},
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Securing nonintrusive web encryption through information flow},
  booktitle    = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375696.1375712},
  doi          = {10.1145/1375696.1375712},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/ZhengM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pldi/2008plas,
  editor       = {{\'{U}}lfar Erlingsson and
                  Marco Pistoia},
  title        = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-59593-936-4},
  timestamp    = {Mon, 16 Jun 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/2008plas.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}