【24h】

Cautious virus detection in the extreme

机译:极端情况下的谨慎病毒检测

获取原文

摘要

It is my pleasure to present this proceedings of the 2nd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2007), which took place on June 14, 2007 in San Diego, California, USA. The workshop was held as part of ACM's Federated Computing Research Conference (FCRC), as a satellite event of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2007). >The call for papers solicited submissions of three kinds: full-length technical papers for relatively mature work; short papers for less detailed or more preliminary work; and proposals for informal presentations to be given at the workshop but not to appear in the proceedings. The last category was designed to support the discussion of important and promising ideas at the workshop, even if the ideas were not yet ready for formal publication. Papers submitted to one category could be accepted in a different category at the program committee's discretion >We received 28 submissions from researchers at locations around the world. The submissions were comprised of 19 full-length papers, 6 short papers, and 3 informal presentations. One full paper was withdrawn prior to being reviewed. The committee ultimately accepted 10 full-length papers, 3 short papers, and 1 informal presentation. The submitted papers encompassed a variety of topics, including: inferring and enforcing information flow properties in programming languages, statically analyzing software for security vulnerabilities, specifying and enforcing security policies in software, intrusion detection, and models of declassification. Many committee members commented to me on the high quality of the papers we received. I am confident you will be impressed with the strength of the final program contained within these pages
机译:我很高兴在2007年6月14日在美国加利福尼亚州圣地亚哥举行的第二届ACM SIGPLAN编程语言和安全分析研讨会(PLAS 2007)上介绍本会议记录。该研讨会是ACM 联合计算研究会议(FCRC)的一部分,是 ACM SIGPLAN编程语言设计和实现会议(PLDI 2007)的卫星活动。

征集论文征集了三种类型的论文:相对成熟的技术论文全文;简短的论文,用于较不详细或较初步的工作;非正式演讲的建议将在研讨会上提出,但不会出现在会议记录中。最后一个类别旨在支持研讨会上重要且有前途的想法的讨论,即使这些想法尚未准备好正式发布。程序委员会可酌情决定将一类论文提交给其他类别

我们收到了来自全球各地研究人员的28篇论文。提交的材料包括19篇全长论文,6篇短论文和3篇非正式演讲。在审阅之前,已撤消一篇论文全文。该委员会最终接受了10篇全长论文,3篇短论文和1篇非正式演讲。提交的论文涵盖了多个主题,包括:用编程语言推断和强制执行信息流属性,针对安全漏洞静态分析软件,在软件中指定和强制执行安全策略,入侵检测以及解密模型。许多委员会成员对我收到的高质量论文发表了评论。我相信您会对这些页面中包含的最终程序的强大功能印象深刻

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号