Finding protocol manipulation attacks
Proceedings of the ACM SIGCOMM 2011 conference
SAFERPHP: finding semantic vulnerabilities in PHP applications
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
Leveraging "choice" to automate authorization hook placement
Proceedings of the 2012 ACM conference on Computer and communications security
Precise enforcement of progress-sensitive security
Proceedings of the 2012 ACM conference on Computer and communications security
Formal verification of side-channel countermeasures using self-composition
Science of Computer Programming
Context-sensitive delta inference for identifying workload-dependent performance bottlenecks
Proceedings of the 2013 International Symposium on Software Testing and Analysis
Noninterference in a predicative polymorphic calculus for access control
Computer Languages, Systems and Structures
Hi-index | 0.00 |
We consider using trust information to improve the anonymity provided byonion-routing networks. In particular, we introduce a model of trustin network nodes and use it to design path-selection strategies thatminimize the probability that the adversary ...