Stack inspection is a security mechanism implemented in runtimes such as the JVM and the CLR to accommodate components with diverse levels of trust. Although stack inspection enables the fine-grained expression of access control policies, it has rather a complex and subtle semantics. We present a formal semantics and an equational theory to explain how stack inspection affects program behavior and code optimisations. We discuss the security properties enforced by stack inspection, and also consider variants with stronger, simpler properties
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
We present a new static analysis for reviewing the se-curity of libraries for systems, such as JVMs ...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
Abstract. Security folklore holds that a security mechanism based on stack inspection is incompatibl...
Abstract. Security folklore holds that a security mechanism based on stack inspection is incompatibl...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
The term stack safety is used to describe a variety of compiler, runtime, and hardware mechanisms fo...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
We present a new static analysis for reviewing the se-curity of libraries for systems, such as JVMs ...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
Abstract. Security folklore holds that a security mechanism based on stack inspection is incompatibl...
Abstract. Security folklore holds that a security mechanism based on stack inspection is incompatibl...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
The term stack safety is used to describe a variety of compiler, runtime, and hardware mechanisms fo...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...