A security-oriented program transformation maps pro-grams to security-augmented programs, i.e. it introduces a security solution to make programs more secure. Our previous work defined security-oriented program transfor-mations [6], introduced a catalog of program transforma-tions [8], and showed how program transformations could be applied to systematically eradicate various types of data injection attacks [9]. This paper shows how security-oriented program transformations could be used to improve the security of a system’s perimeter by introducing authenti-cation, authorization and input validation components. The program transformation examples in this paper are JAVA specific, but the transformations could be implemented to use other aut...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Many secure applications are emerging using the Java TM language and running on the Java platform....
Security requirements change, but the typical way of improving system security by patches is ad hoc ...
Abstract. Security requirements change, but the typical way of im-proving system security by patches...
Security experts generally believe that, "security cannot be added on, it must be designed from the ...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Before starting a rigorous security analysis of a given software system, the most likely outcome is ...
My thesis is that languages and frameworks can and should be designed to make it easier for programm...
peer reviewedSecurity of Java-based applications is crucial to many businesses today. In this paper,...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Many secure applications are emerging using the Java TM language and running on the Java platform....
Security requirements change, but the typical way of improving system security by patches is ad hoc ...
Abstract. Security requirements change, but the typical way of im-proving system security by patches...
Security experts generally believe that, "security cannot be added on, it must be designed from the ...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Before starting a rigorous security analysis of a given software system, the most likely outcome is ...
My thesis is that languages and frameworks can and should be designed to make it easier for programm...
peer reviewedSecurity of Java-based applications is crucial to many businesses today. In this paper,...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Many secure applications are emerging using the Java TM language and running on the Java platform....