The base class library of the.NET Framework makes extensive use of the Code Access Security system to ensure that partially trusted code can be executed securely. Imperative or declarative permission demands indicate where permission checks have to be performed at run time to make sure partially trusted code does not exceed the permissions granted to it in the security policy. In this paper we propose expressive method contracts for specifying required security permissions, and a modular static verification technique for Code Access Security based on these method contracts. If a program verifies, it will never fail a run time check for permissions, and hence these run time checks can be omitted. Advantages of our approach include improved r...
A static approach is proposed to study secure composition of software. We extend the λ calculus with...
Explicit or implicit, enforced or not, safety policies are ubiquitous in software systems. In the ma...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
Abstract. In computing systems, trust is an expectation on the dynamic behavior of an agent; static ...
We present a language for access control. The language is organized around the notion of execution o...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
Developing and delivering secure software is a challenging task, that gets even harder when the deve...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
International audienceThe ideal software contract fully specifies the behavior of an operation. Ofte...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract—This paper proposes and details the notion of trust by policy adherence (TBPA), meaning tha...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
A static approach is proposed to study secure composition of software. We extend the λ calculus with...
Explicit or implicit, enforced or not, safety policies are ubiquitous in software systems. In the ma...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
Abstract. In computing systems, trust is an expectation on the dynamic behavior of an agent; static ...
We present a language for access control. The language is organized around the notion of execution o...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
Developing and delivering secure software is a challenging task, that gets even harder when the deve...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
International audienceThe ideal software contract fully specifies the behavior of an operation. Ofte...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract—This paper proposes and details the notion of trust by policy adherence (TBPA), meaning tha...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
A static approach is proposed to study secure composition of software. We extend the λ calculus with...
Explicit or implicit, enforced or not, safety policies are ubiquitous in software systems. In the ma...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...