• Nitpick

  • Referenced in 63 articles [sw00622]
  • case studies, we consider a security type system and a hotel key card system...
  • Miranda

  • Referenced in 153 articles [sw04986]
  • polymorphic type system and (ii) a library structure with type secure facilities for separate compilation ... with a discussion of the type system and in particular the facilities for userdefined types...
  • gmp

  • Referenced in 282 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research ... using fullwords as the basic arithmetic type, by using fast algorithms, with highly optimised assembly...
  • Volpano Smith

  • Referenced in 1 article [sw29543]
  • Correctness Proof for the Volpano/Smith Security Typing System. The Volpano/Smith/Irvine security type systems requires that...
  • SeLINQ

  • Referenced in 2 articles [sw28379]
  • single component does not render the entire system insecure. While information flow in a variety ... boundaries is necessary for end-to-end security. This paper proposes a framework for uniform ... flow control for applications and thus guarantee security across application-database boundaries. We develop ... results in the form of a security type system that includes a treatment of algebraic...
  • F*

  • Referenced in 20 articles [sw27563]
  • This enables verifying the functional correctness and security of realistic applications. The main ongoing ... type system includes dependent types, monadic effects, refinement types, and a weakest precondition calculus. Together ... specifications for programs, including functional correctness and security properties. The F* type-checker aims...
  • Jif

  • Referenced in 19 articles [sw16478]
  • Java information flow. Jif is a security-typed programming language that extends Java with support ... compiler and run-time system is available for download. Jif is written in Java...
  • JSLINQ

  • Referenced in 1 article [sw27567]
  • single component does not render the entire system insecure. As of today, the majority ... ensuring security across tiers. This paper proposes a framework for end-to-end security ... enforcement in the form of a security type system for a functional language with mutable...
  • Flow Caml

  • Referenced in 6 articles [sw08923]
  • extension of the OCaml with a type system tracing information flow. Its purpose is basically ... Flow Caml, standard ML types are annotated with security levels chosen in a user-definable ... convey. Because it has full type inference, the system verifies, without requiring source code annotations ... programming language equipped with a type system that features simultaneously subtyping, ML polymorphism and full...
  • MetaKlaim

  • Referenced in 5 articles [sw01810]
  • linking of code fragments), dynamic checking of security policies at administrative boundaries and `traditional’ computational ... code mobility). MetaKlaim exploits a powerful type system (including polymorphic types à la system ... highly parameterised mobile components and to enforce security policies dynamically: types are metadata that...
  • UCLID

  • Referenced in 25 articles [sw04657]
  • infinite-state systems with variables of integer, Boolean, function, and array types. There ... include microprocessor design verification, analyzing software for security exploits, and verifying distributed algorithms...
  • Laminar

  • Referenced in 3 articles [sw23077]
  • with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity hardware ... broadly categorized into two types: language-level and operating system-level DIFC. Language level solutions ... provide no guarantees against security violations on system resources, like files and sockets. Operating system ... Whereas prior DIFC systems only support limited types of multithreaded programs, Laminar supports a more...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • wide range of security attacks. However, current information flow tracking systems are not very practical ... overhead, software-only information flow tracking system, called LIFT, which minimizes run-time overhead ... instrumentation and optimizations for detecting various types of security attacks without requiring any hardware changes ... that LIFT can effectively detect various types of security attacks. LIFT also incurs very...
  • Cryptyc

  • Referenced in 3 articles [sw12834]
  • type checker. The Cryptyc system is a Cryptographic Protocol Type Checker. Unlike most typecheckers ... check for security violations such as secrecy or authenticity errors. The Cryptyc system is implemented...
  • TS#

  • Referenced in 3 articles [sw14208]
  • typing embedded securely in JavaScript, ... We present TS# , a gradual type system and source ... systems, TS# features full runtime reflection over three kinds of types: (1) simple types ... type any, for dynamically type-safe TS# expressions; and (3) the type un, for untrusted ... programs are well-typed in JS# , a previously proposed dependently typed language for proving functional...
  • LaCasa

  • Referenced in 2 articles [sw34853]
  • important obstacles to the adoption of type system extensions for aliasing control. First, adaptation ... used in program security. We formalize our approach as a type system and prove...
  • CRYPTALL

  • Referenced in 6 articles [sw06981]
  • CRYPTALL: System to encrypt all types of data. We have developed a software prototype ... encrypting all types of data such as text files; word documents; PostScript and PDF documents ... secure virtual organization, such as a virtual education, using a networked e-learning system ... encryption, thus it resists to different types of attacks of adversary. The first package “CRYPTIm...
  • PassPoints

  • Referenced in 4 articles [sw30797]
  • longitudinal evaluation of a graphical password system. Computer security depends largely on passwords to authenticate ... passwords over time if they choose a secure password, i.e. a password that is long ... than typing alphanumeric strings, may help to overcome the problem of creating secure and memorable ... PassPoints, a new and more secure graphical password system. We report an empirical study comparing...
  • NVisionIP

  • Referenced in 4 articles [sw07393]
  • systems is currently growing at a rapid pace. Despite the best efforts of security analysts ... NVisionIP that is designed to increase the security analyst’s situational awareness. As humans ... NVisionIP along with a discussion of various types of security-related scenarios that...
  • Lintent

  • Referenced in 2 articles [sw21576]
  • Lintent: towards security type-checking of android applications. The widespread adoption of Android devices ... attracted the attention of a growing computer security audience. Fundamental weaknesses and subtle design flaws ... protection mechanisms, or changes to the operating system. This paper complements this research by developing ... effect system to statically prevent privilege escalation attacks on well-typed components. Drawing...