Abstract. The number of applications that are downloaded from the Internet and executed on-the-fly is increasing every day. Unfortunately, not all of these applications are benign, and, often, users are unsuspecting and unaware of the intentions of a program. To facilitate and secure this growing class of mobile code, Microsoft introduced the.NET framework, a new development and runtime environment where machineindependent byte-code is executed by a virtual machine. An important feature of this framework is that it allows access to native libraries to support legacy code or to directly invoke the Windows API. Such native code is called unmanaged (as opposed to managed code). Unfortunately, the execution of unmanaged native code is not restr...
This dissertation presents a novel security architecture called security-passing style and motivates...
Over the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mo...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
Abstract The number of applications that are down-loaded from the Internet and executed on-the-fly i...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
The applications we use today are developed as a combination of first-party code and code borrowed f...
The .NET Framework is a managed type-safe environment for application development and execution. The...
Nowadays systems that download updates from the net or let the user download third-party code for ex...
For performance and for incorporating legacy libraries, many Java applications contain native-code c...
For performance and for incorporating legacy libraries, many Java applications contain native-code c...
In today’s computing world, computer code is most often developed on one computer and run on another...
Abstract—The standard loader (ld.so) is a common target of attacks. The loader is a trusted componen...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This thesis presents an innovative approach to implementing a security enforcement mechanism in the ...
This dissertation presents a novel security architecture called security-passing style and motivates...
Over the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mo...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...
Abstract The number of applications that are down-loaded from the Internet and executed on-the-fly i...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
The applications we use today are developed as a combination of first-party code and code borrowed f...
The .NET Framework is a managed type-safe environment for application development and execution. The...
Nowadays systems that download updates from the net or let the user download third-party code for ex...
For performance and for incorporating legacy libraries, many Java applications contain native-code c...
For performance and for incorporating legacy libraries, many Java applications contain native-code c...
In today’s computing world, computer code is most often developed on one computer and run on another...
Abstract—The standard loader (ld.so) is a common target of attacks. The loader is a trusted componen...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This thesis presents an innovative approach to implementing a security enforcement mechanism in the ...
This dissertation presents a novel security architecture called security-passing style and motivates...
Over the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mo...
Stack inspection-based sandboxing originated as a security mechanism for safely executing partially ...