With the rapid increase in usage of the internet and online applications, there is a huge demand for applications to handle data privacy and integrity. Applications are already complex with business logic; adding the data safety logic would make them more complicated. The more complex the code becomes, the more possibilities it opens for security-critical bugs. To solve this conundrum, we can push this data safety handling feature to the language level rather than the application level. With a secure language, developers can write their application without having to worry about data security. This project introduces dynamic information flow analysis in Ruby. I extend the JRuby implementation, which is a widely used implementation of Ruby wr...
Over the years, computer systems and applications have grown significantly complex while handling a ...
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our...
This thesis investigates the specification and the application of dynamic security policies in infor...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Web applications in many domains such as healthcare and finance must process sensitive data, while c...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Web applications in many domains such as healthcare and finance must process sensitive data, while c...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
When a computer program requires legitimate access to confidential data, the question arises whether...
When a computer program requires legitimate access to confidential data, the question arises whether...
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for dat...
This paper explores information flow control in systems in which the security classes of data can v...
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our...
This paper explores information flow control in systems in which the security classes of data can va...
Information flow analysis prevents secret or untrusted data from flowing into public or trusted sink...
Over the years, computer systems and applications have grown significantly complex while handling a ...
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our...
This thesis investigates the specification and the application of dynamic security policies in infor...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Web applications in many domains such as healthcare and finance must process sensitive data, while c...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Web applications in many domains such as healthcare and finance must process sensitive data, while c...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
When a computer program requires legitimate access to confidential data, the question arises whether...
When a computer program requires legitimate access to confidential data, the question arises whether...
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for dat...
This paper explores information flow control in systems in which the security classes of data can v...
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our...
This paper explores information flow control in systems in which the security classes of data can va...
Information flow analysis prevents secret or untrusted data from flowing into public or trusted sink...
Over the years, computer systems and applications have grown significantly complex while handling a ...
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our...
This thesis investigates the specification and the application of dynamic security policies in infor...