This thesis explores information-flow tracking technologies and their applicability on industrial-scale dynamic programming languages. We aim to narrow the gap between the need for flexibility in current dynamic languages and the solid well-studied mechanisms from academia. Instead of translating perfect sound theoretical results into a practical implementation, this thesis focuses on practical problems found in dynamic languages and, from them on, looks for the academic support to tackle them.We investigate the compromise between security and flexibility for protecting confidentiality and integrity. Furthermore, using purely dynamic techniques, we implement our ideas to demonstrate their practicability.On the integrity protection side, a t...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Information Flow Control is a well established field of research, providing a suite of theoretical a...
Language-based information-flow security considers programs that manipulate pieces of data at differ...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Information Flow Control is a well established field of research, providing asuite of theoretical an...
Over the years, computer systems and applications have grown significantly complex while handling a ...
Over the years, computer systems and applications have grown significantly complex while handling a ...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Language-based information-flow security considers programs that manipulate pieces of data at differ...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Information Flow Control is a well established field of research, providing a suite of theoretical a...
Language-based information-flow security considers programs that manipulate pieces of data at differ...
This thesis explores information-flow tracking technologies and their applicability on industrial-sc...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Information Flow Control is a well established field of research, providing asuite of theoretical an...
Over the years, computer systems and applications have grown significantly complex while handling a ...
Over the years, computer systems and applications have grown significantly complex while handling a ...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Historically, dynamic techniques are the pioneers of the area of informationflow in the 70’s. In the...
Language-based information-flow security considers programs that manipulate pieces of data at differ...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Information Flow Control is a well established field of research, providing a suite of theoretical a...
Language-based information-flow security considers programs that manipulate pieces of data at differ...