This paper describes an approach for the automated verification of mobile programs. Mobile systems are characterized by the explicit notion of locations (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. We give formal semantics to mobile systems as Labeled Kripke Structures, which encapsulate the notion of the location net. The location net summarizes the hierarchical nesting of threads constituting a mobile program and enables specifying security policies. We formalize a language for specifying security policies and show how mobile programs can be exhaustively analyzed against any given security policy by using model checking techniques. We developed and experimented wi...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
This article describes an approach for the automated verification of mobile systems. Mobile systems ...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Mobile programs, like applets, are not only ubiquitous but also potentially malicious. We study the ...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
This article describes an approach for the automated verification of mobile systems. Mobile systems ...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Mobile programs, like applets, are not only ubiquitous but also potentially malicious. We study the ...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...