Köpf, BorisBorisKöpfMantel, HeikoHeikoMantel2022-11-032022-11-032007-03-02International Journal of Information Security 6 (2/3): 107-131 (2007-03-02)http://hdl.handle.net/11420/13917Before starting a rigorous security analysis of a given software system, the most likely outcome is often already clear, namely that the system is not entirely secure. Modifying a program such that it passes the analysis is a difficult problem and usually left entirely to the programmer. In this article, we show that and how unification can be used to compute such program transformations. This opens a new perspective on the problem of correcting insecure programs. We also demonstrate that integrating our approach into an existing transforming type system can improve the precision of the analysis and the quality of the resulting programs.en1615-5270International journal of information security20072/3107131SpringerInformation flow controlLanguage-based securitySecurity type systemUnificationInformatikTransformational typing and unification for automatically correcting insecure programsJournal Article10.1007/s10207-007-0016-zOther