AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code consumer at the bytecode level. Unfortunately, formulating a sound static type system for the full JVM bytecode language can be a daunting task. It is therefore counter-productive for the designer of a bytecode-level type system to address the full complexity of the VM environment in the early stage of design.In this work, a lightweight modelling tool, Featherweight JVM, is proposed to facilitate the early evaluation of bytecode-level, type-based protection mechanisms and, specifically, their ability to enforce security-motivated stack invariants and confinement properties. Rather than modelling the execution of a specific bytecode stream, F...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Secure cooperation is the problem of protecting mutually suspicious code units within the same execu...
AbstractThe current definition of the Java bytecode verifier, as well as the proposals to formalize ...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Secure cooperation is the problem of protecting mutually suspicious code units within the same execu...
AbstractThe current definition of the Java bytecode verifier, as well as the proposals to formalize ...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...