Secure Internet Programming - menu
Secure Internet Programming
Home
Projects
People
Publications
Support
Seminar
History
FAQ
Princeton University
Department of Computer Science

sip@cs.princeton.edu

Publications

Enforcing Security Policies with Polymer. Lujo Bauer, Jay Ligatti, and David Walker. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2005. To appear.

Enforcing Non-safety Security Policies with Program Monitors. Jay Ligatti, Lujo Bauer, and David Walker. Princeton University Technical Report TR-720-05, January 2005.

A Theory of Aspects.   David Walker, Steve Zdancewic and Jay Ligatti.   To appear in Proceedings of the ACM SIGPLAN International Conference on Functional Programming, Uppsala, Sweden, August 2003.

An Effective Theory of Type Refinements.   Yitzhak Mandelbaum, David Walker and Robert Harper.   To appear in Proceedings of the ACM SIGPLAN International Conference on Functional Programming, Uppsala, Sweden, August 2003.

Reasoning about Hierarchical Storage .  Amal Ahmed, Limin Jia, and David Walker.  In Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS 2003), pp. 33-44, Ottawa, Canada, June 2003.

Using Memory Errors to Attack a Virtual Machine.   Sudhakar Govindavajhala and Andrew Appel.   In IEEE Symposium on Security and Privacy, Oakland, May, 2003.

Edit Automata: Enforcement Mechanisms for Run-time Security Policies.  Jay Ligatti, Lujo Bauer, and David Walker.  Princeton University Technical Report TR-681-03, December 2002; revised May 2003.  (This is a revised and extended version of "More Enforceable Security Policies," which first appeared in the Workshop on Foundations of Computer Security, July 2002.)

Mechanisms for Secure Modular Programming in Java. Lujo Bauer, Andrew W. Appel, and Edward W. Felten. Software—Practice and Experience, 33(5):461–480, 2003.

Types and Effects for Non-interfering Program Monitors.  Lujo Bauer, Jarred Ligatti, and David Walker.  In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security—Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, volume 2609 of Lecture Notes in Computer Science. Springer, 2003.

The Logical Approach to Stack Typing .  Amal Ahmed and David Walker.  In Proceedings of the ACM SIGPLAN Workshop on Types in Language Design and Implementation (TLDI 2003), pp. 74-85, New Orleans, January 2003.

Enforcing Resource Usage Analysis via Scoped Methods .  Gang Tan, Xinming Ou and David Walker. Foundations of Object-Oriented Languages, New Orleans, January, 2003.

An Effective Theory of Type Refinements .  Yitzhak Mandelbaum, David Walker and Robert Harper.  Princeton University Technical Report TR-656-02, December 2002.

A Calculus for Composing Security Policies.  Lujo Bauer, Jarred Ligatti and David Walker.  Princeton University Technical Report TR-655-02, August 2002.

A Stratified Semantics of General References Embeddable in Higher-Order Logic.  Amal J. Ahmed, Andrew W. Appel, and Roberto Virga.  Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS 2002), pp. 75-86, Copenhagen, Denmark, July 2002.

More Enforceable Security Policies. Lujo Bauer, Jarred Ligatti and David Walker. Workshop on Foundations of Computer Security (FCS '02) (associated with LICS '02), Copenhagen, Denmark, July 2002. Note: An extended version appears as Princeton University Technical Report TR-649-02.

A General and Flexible Access-Control System for the Web. Lujo Bauer, Michael A. Schneider, and Edward W. Felten. Proceedings of the 11th USENIX Security Symposium, August 2002.

A Proof-Carrying Authorization System. Lujo Bauer, Michael A. Schneider, and Edward W. Felten. Technical report CS-TR-638-01, Department of Computer Science, Princeton University, April 2001.

Timing Attacks on Web Privacy. Edward W. Felten and Michael A. Schneider. Proc. of ACM Conference on Computer and Communications Security. November 2000.

An Indexed Model of Recursive Types for Foundational Proof-Carrying Code. Andrew W. Appel and David McAllester. Princeton University Computer Science TR-629-00, November 2000.

A Security Infrastructure for Distributed Java Applications . Dirk Balfanz, Drew Dean, Mike Spreitzer. Proceedings of 2000 IEEE Symposium on Security and Privacy, May, 2000.

Machine Instruction Syntax and Semantics in Higher Order Logic. Neophytos G. Michael and Andrew W. Appel. 17th International Conference on Automated Deduction (CADE-17), Springer-Verlag (Lecture Notes in Artificial Intelligence), June 2000 (to appear).

Hand-Held Computers Can Be Better Smart Cards. Dirk Balfanz, Ed Felten. Proceedings of USENIX Security '99, August, 1999.

Safe Garbage Collection = Regions + Intensional Type Analysis, Daniel C. Wang and Andrew W. Appel, July 1999.

Hierarchical Modularity. Matthias Blume and Andrew W. Appel, ACM Transactions on Programming Languages and Systems, to appear.

A Semantic Model of Types and Machine Instructions for Proof-Carrying Code, Andrew W. Appel and Amy P. Felty, 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '00), pp. 243-253, January 2000.

Mechanisms for Secure Modular Programming in Java, Lujo Bauer, Andrew W. Appel, and Edward W. Felten, Technical report CS-TR-603-99, Department of Computer Science, Princeton University, July 1999.

Lightweight Lemmas in Lambda Prolog, Andrew W. Appel and Amy P. Felty, to appear in 16th International Conference on Logic Programming, pp. 411-425, November 1999.

Proof-Carrying Authentication. Andrew W. Appel and Edward W. Felten, 6th ACM Conference on Computer and Communications Security, November 1999.

TALx86: A Realistic Typed Assembly Language. Greg Morrisett, Karl Crary, Neal Glew, Dan Grossman, Richard Samuels, Frederick Smith, Dave Walker, Stephanie Weirich, and Steve Zdancewic. In the ACM SIGPLAN Workshop on Compiler Support for System Software, pages 25-35, Atlanta, May 1999.

Securing Java: Getting Down to Business with Mobile Code. Gary McGraw and Edward Felten. John Wiley and Sons, New York, 1999.

A New Approach to Mobile Code Security. Dan Seth Wallach. PhD thesis, Princeton University, January 1999.

Formal Aspects of Mobile Code Security. Richard Drews Dean. PhD thesis, Princeton University, January 1999.

Understanding Java Stack Inspection. Dan S. Wallach and Edward W. Felten. Proceedings of 1998 IEEE Symposium on Security and Privacy (Oakland, California), May 1998.

Java Security: Web Browers and Beyond. Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz. Internet Beseiged: Countering Cyberspace Scofflaws, Dorothy E. Denning and Peter J. Denning, eds. ACM Press (New York, New York), October 1997.

A Java Filter. Dirk Balfanz, Ed Felten. Technical Report 567-97, Department of Computer Science, Princeton University, October, 1997.

Extensible Security Architectures for Java. Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten. 16th Symposium on Operating Systems Principles (Saint-Malo, France), October, 1997.

Web Spoofing: An Internet Con Game. Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach. 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997.

Experience with Secure Multi-Processing in Java. Dirk Balfanz, Li Gong. Technical Report 560-97, Department of Computer Science, Princeton University, September, 1997.

The Security of Static Typing with Dynamic Linking . Drew Dean, Proceedings of the Fourth ACM Conference on Computer and Communications Security (Zürich, Switzerland), April 1997.

Java Security: Hostile Applets, Holes and Antidotes. Gary McGraw and Edward W. Felten. John Wiley and Sons, New York, 1996.

Java Security: From HotJava to Netscape and Beyond. Drew Dean, Edward W. Felten, and Dan S. Wallach. Proceedings of 1996 IEEE Symposium on Security and Privacy (Oakland, California), May 1996.


The documents contained in these pages are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.