Security flaws are routinely discovered in commercial implementations of mobile code systems such as the Java Virtual Machine (JVM). Typical architectures for such systems exhibit complex interdependencies between the loader, the verifier, and the linker, making them difficult to craft, validate, and maintain. This reveals a software engineering challenge that is common to all mobile code systems in which a static verification phase is introduced before dynamic linking. In such systems, one has to articulate how loading, verification, and linking interact with each other, and how the three processes should be organized to address various security issues. We propose a standard architecture for crafting mobile code verifiers, based on the con...
The language-based approach to security employs programming language technologies to construct secur...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
AbstractVirtual machines and proof-carrying code provide two techniques that have been used independ...
This dissertation presents a critical rethinking of the Java bytecode verification architecture from...
Abstract To offload the computational burden of bytecode verification within Java Virtual Machines (...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Through the design and implementation of a JVM that supports Pluggable Verification Modules (PVMs), ...
Through the design and implementation of a JVM that supports Pluggable Verification Modules (PVMs), ...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Security of mobile code is a major issue in today's global computing environment. When you download...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
This dissertation presents a novel security architecture called security-passing style and motivates...
The language-based approach to security employs programming language technologies to construct secur...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
AbstractVirtual machines and proof-carrying code provide two techniques that have been used independ...
This dissertation presents a critical rethinking of the Java bytecode verification architecture from...
Abstract To offload the computational burden of bytecode verification within Java Virtual Machines (...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Through the design and implementation of a JVM that supports Pluggable Verification Modules (PVMs), ...
Through the design and implementation of a JVM that supports Pluggable Verification Modules (PVMs), ...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Security of mobile code is a major issue in today's global computing environment. When you download...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
This dissertation presents a novel security architecture called security-passing style and motivates...
The language-based approach to security employs programming language technologies to construct secur...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
AbstractVirtual machines and proof-carrying code provide two techniques that have been used independ...