skip to main content
10.1145/2336717acmconferencesBook PagePublication PagespldiConference Proceedingsconference-collections
PLAS '12: Proceedings of the 7th Workshop on Programming Languages and Analysis for Security
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
PLDI '12: ACM SIGPLAN Conference on Programming Language Design and Implementation Beijing China 15 June 2012
ISBN:
978-1-4503-1441-1
Published:
15 June 2012
Sponsors:

Reflects downloads up to 24 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

The ACM SIGPLAN 7th Workshop on Programming Languages and Analysis for Security (PLAS) was held on June 15th, 2012 as a satellite event of PLDI 2012 in Beijing, China. The workshop featured six full papers and three position papers. The workshop also featured invited talks by Andrew Myers of Cornell University and Gilles Barthe of IMDEA Software.

Skip Table Of Content Section
research-article
Typing illegal information flows as program effects
Article No.: 1, Pages 1–12https://doi.org/10.1145/2336717.2336718

Specification of information flow policies is classically based on a security labeling and a lattice of security levels that establishes how information can flow between security levels. We present a type and effect system for determining the least ...

research-article
Knowledge-oriented secure multiparty computation
Article No.: 2, Pages 1–12https://doi.org/10.1145/2336717.2336719

Protocols for secure multiparty computation (SMC) allow a set of mutually distrusting parties to compute a function f of their private inputs while revealing nothing about their inputs beyond what is implied by the result. Depending on f, however, the ...

research-article
Security-policy monitoring and enforcement with JavaMOP
Article No.: 3, Pages 1–11https://doi.org/10.1145/2336717.2336720

Software security attacks represent an ever growing problem. One way to make software more secure is to use Inlined Reference Monitors (IRMs), which allow security specifications to be inlined inside a target program to ensure its compliance with the ...

research-article
Security correctness for secure nested transactions: position paper
Article No.: 4, Pages 1–6https://doi.org/10.1145/2336717.2336721

This article considers the synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is an approach to supporting end-to-end security for a wide ...

research-article
A generic approach for security policies composition: position paper
Article No.: 5, Pages 1–4https://doi.org/10.1145/2336717.2336722

When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general ...

research-article
Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paper
Article No.: 6, Pages 1–6https://doi.org/10.1145/2336717.2336723

A software product line encodes a potentially large variety of software products as variants of some common code base, e.g., through the use of #ifdef statements or other forms of conditional compilation. Traditional information-flow analyses cannot ...

research-article
Towards a taint mode for cloud computing web applications
Article No.: 7, Pages 1–12https://doi.org/10.1145/2336717.2336724

Cloud computing is generally understood as the distribution of data and computations over the Internet. Over the past years, there has been a steep increase in web sites using this technology. Unfortunately, those web sites are not exempted from ...

research-article
Hash-flow taint analysis of higher-order programs
Article No.: 8, Pages 1–12https://doi.org/10.1145/2336717.2336725

As web applications have grown in popularity, so have attacks on such applications. Cross-site scripting and injection attacks have become particularly problematic. Both vulnerabilities stem, at their core, from improper sanitization of user input.

We ...

research-article
Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environment
Article No.: 9, Pages 1–12https://doi.org/10.1145/2336717.2336726

FoCaLiZe is an object-oriented programming environment that combines specifications, programs and proofs in the same language. This paper describes how its features can be used to formally express specifications and to develop by stepwise refinement the ...

Contributors
  • Imperial College London
  • University of Côte d’Azur
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 43 of 77 submissions, 56%
YearSubmittedAcceptedRate
PLAS '184250%
PLAS '1710880%
PLAS '1611655%
PLAS'159556%
PLAS'1410660%
PLAS '1314857%
PLAS '0919842%
Overall774356%