This paper describes a mechanism for protecting against malicious mobile code. As mobile code is linked with a hosting application and executed in the same process, a fine-grained protection domain providing an intra-process protection is required to prevent a malicious mobile code from unauthorized access. This paper introduces a multi-protection page table: a mechanism of virtual memory that enables fine-grained protection domains to be supported at the kernel level. A fine-grained protection domain (1) confines the memory accesses by mobile code in authorized areas, (2) restricts the system calls issued by mobile code, and (3) enables efficient cross-domain calls among mobile codes and a hosting application. Efficiency of cross-domain ca...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code is computer code that roams and executes remotely on a computer network. While it has ad...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
The dependability issue including fault tolerance and security is a basic stumbling block to the pr...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Abstract. Mobile code refers to programs that come into a host computer over the network and start t...
The technological evolution towards extensible software systems and component-based software develop...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code is computer code that roams and executes remotely on a computer network. While it has ad...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
The dependability issue including fault tolerance and security is a basic stumbling block to the pr...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Abstract. Mobile code refers to programs that come into a host computer over the network and start t...
The technological evolution towards extensible software systems and component-based software develop...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...