Implicit Flows: Can't Live with 'Em, Can't Live without 'Em

  title={Implicit Flows: Can't Live with 'Em, Can't Live without 'Em},
  author={Dave King and Boniface Hicks and Michael Hicks and Trent Jaeger},
Verifying that programs trusted to enforce security actually do so is a practical concern for programmers and administrators. However, there is a disconnect between the kinds of tools that have been successfully applied to real software systems (such as taint mode in Perl and Ruby), and information-flow compilers that enforce a variant of the stronger security property of noninterference. Tools that have been successfully used to find security violations have focused on explicit flows of… CONTINUE READING
Highly Cited
This paper has 89 citations. REVIEW CITATIONS
50 Extracted Citations
25 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.
Showing 1-10 of 50 extracted citations

90 Citations

Citations per Year
Semantic Scholar estimates that this publication has 90 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…