Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacting applications. However, in all the proposed approaches, capabilities are made available at the programming language level, requiring application developers to wire protection definition in the application code, which is detrimental to both flexibility and reusability. We believe instead that capabilities should be hidden from the application programmer, allowing protection definition and application code to be clearly separated. In this paper, we propose a new protection model based on hidden software capabilities, in which protection definition is completely disj...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Software applications contain valuable assets that, if compromised, can make the security of users a...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Secure distributed applications often include code to authenticate users, verify access rights, and ...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
This publication describes systems and techniques for defining and enforcing privacy restrictions fo...
Abstract—In capability-safe languages, components can access a resource only if they possess a capab...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
[[abstract]]A new method for software program protection by information sharing and authentication t...
With the recent advent of dynamically extensible software systems, in which software extensions may ...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Programming security vulnerabilities are the most common cause of software security breaches in curr...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Software applications contain valuable assets that, if compromised, can make the security of users a...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Secure distributed applications often include code to authenticate users, verify access rights, and ...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
This publication describes systems and techniques for defining and enforcing privacy restrictions fo...
Abstract—In capability-safe languages, components can access a resource only if they possess a capab...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
[[abstract]]A new method for software program protection by information sharing and authentication t...
With the recent advent of dynamically extensible software systems, in which software extensions may ...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Programming security vulnerabilities are the most common cause of software security breaches in curr...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Software applications contain valuable assets that, if compromised, can make the security of users a...