AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set of permissions granted/denied to code at run-time. This static information helps optimizing the implementation of the stack inspection algorithm
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
The results of empirical studies in Software Engineering are limited to particular contexts, difficu...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
Abstract. The security manager in Java 2 is a runtime access control mechanism. Whenever an access p...
Static analysis tools cannot detect violations of application-specific rules. They can be extended w...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
We describe our software tool Julia for the static analysis of full Java bytecode, for optimisation ...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
The results of empirical studies in Software Engineering are limited to particular contexts, difficu...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
Abstract. The security manager in Java 2 is a runtime access control mechanism. Whenever an access p...
Static analysis tools cannot detect violations of application-specific rules. They can be extended w...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
We describe our software tool Julia for the static analysis of full Java bytecode, for optimisation ...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
The results of empirical studies in Software Engineering are limited to particular contexts, difficu...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...