default search action
Search dblp for Publications
export results for "toc:db/conf/pldi/plas2008.bht:"
@inproceedings{DBLP:conf/pldi/BacaCL08, author = {Dejan Baca and Bengt Carlsson and Lars Lundberg}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Evaluating the cost reduction of static code analysis for software security}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {79--88}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375707}, doi = {10.1145/1375696.1375707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BacaCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ChaudhuriNR08, author = {Avik Chaudhuri and Prasad Naldurg and Sriram K. Rajamani}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A type system for data-flow integrity on windows vista}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {89--100}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375708}, doi = {10.1145/1375696.1375708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ChaudhuriNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/CheneyD08, author = {James Cheney and Morten Dahl}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Resource bound analysis for database queries}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {67--78}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375706}, doi = {10.1145/1375696.1375706}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/CheneyD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/FocardiC08, author = {Riccardo Focardi and Matteo Centenaro}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Information flow security of multi-threaded distributed programs}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {113--124}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375711}, doi = {10.1145/1375696.1375711}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/FocardiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HamlenJ08, author = {Kevin W. Hamlen and Micah Jones}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Aspect-oriented in-lined reference monitors}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375699}, doi = {10.1145/1375696.1375699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HamlenJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HammerSS08, author = {Christian Hammer and R{\"{u}}diger Schaade and Gregor Snelting}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Static path conditions for Java}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {57--66}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375704}, doi = {10.1145/1375696.1375704}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/HammerSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LiemGJ08, author = {Clifford Liem and Yuan Xiang Gu and Harold Johnson}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A compiler-based infrastructure for software-protection}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {33--44}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375702}, doi = {10.1145/1375696.1375702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LiemGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MalacariaC08, author = {Pasquale Malacaria and Han Chen}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Lagrange multipliers and maximum information leakage in different observational models}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {135--146}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375713}, doi = {10.1145/1375696.1375713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MalacariaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MassacciS08, author = {Fabio Massacci and Ida Sri Rejeki Siahaan}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Simulating midlet's security claims with automata modulo theory}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {1--9}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375698}, doi = {10.1145/1375696.1375698}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MassacciS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MowbrayL08, author = {Miranda Mowbray and Antonio Lain}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Dominator-tree analysis for distributed authorization}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {101--112}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375709}, doi = {10.1145/1375696.1375709}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MowbrayL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ShafferAIL08, author = {Alan B. Shaffer and Mikhail Auguston and Cynthia E. Irvine and Timothy E. Levin}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {A security domain model to assess software for exploitable covert channels}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {45--56}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375703}, doi = {10.1145/1375696.1375703}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ShafferAIL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SwamyH08, author = {Nikhil Swamy and Michael Hicks}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Verified enforcement of stateful information release policies}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {21--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375700}, doi = {10.1145/1375696.1375700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SwamyH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ZhengM08, author = {Lantian Zheng and Andrew C. Myers}, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Securing nonintrusive web encryption through information flow}, booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, pages = {125--134}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375696.1375712}, doi = {10.1145/1375696.1375712}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ZhengM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2008plas, editor = {{\'{U}}lfar Erlingsson and Marco Pistoia}, title = {Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-59593-936-4}, timestamp = {Mon, 16 Jun 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/2008plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.