We present a flow and context sensitive compositional information flow analysis for full (mono-threaded) Java bytecode. We base our analysis on the transformation of the Java bytecode into a control-flow graph of basic blocks of code which makes explicit the complex features of the Java bytecode. We represent information flows through Boolean functions and hence implement an accurate and efficient information flow analysis through binary decision diagrams. To the best of our knowledge, it is the first one for full Java bytecode
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
Information flow analysis is an approach to check whether there is no propagation of information tha...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
This paper shows how data flow analysis can be used to infer type information related to Java byteco...
Understanding control ows in a computer program is essential for many software engineering tasks su...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
International audiencePervasive computing is the next generation of comput- ing environments. As a r...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
A semantic-based approach is commonly considered more precise than the type-based approach to enforc...
Abstract. We present an algorithm to extract control-flow graphs from Java bytecode, considering exc...
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a dec...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
Information flow analysis is an approach to check whether there is no propagation of information tha...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
This paper shows how data flow analysis can be used to infer type information related to Java byteco...
Understanding control ows in a computer program is essential for many software engineering tasks su...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
International audiencePervasive computing is the next generation of comput- ing environments. As a r...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
A semantic-based approach is commonly considered more precise than the type-based approach to enforc...
Abstract. We present an algorithm to extract control-flow graphs from Java bytecode, considering exc...
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a dec...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
Information flow analysis is an approach to check whether there is no propagation of information tha...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...