We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form. We are developing SafeTSA as an alternative to the Java Virtual Machine, over which it has several advantages: (1) SafeTSA is better suited as input to optimizing dynamic code generators and allows CSE to be performed at the code producer's site. (2) SafeTSA provides incorruptible referential integrity and uses "type separation" to achieve intrinsic type safety. These properties reduce the code verification e#ort at the code consumer's site considerably. (3) SafeTSA can transport the results of type and bounds-check elimination in a tamper-proof manner. Despite these advantages, SafeTSA is more compact than Java bytecode
We present a novel transfer format for mobile programs that is a hybrid of two existing formats: byt...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract. Popular mobile code architectures (Java and.NET) include verifiers to check for memory saf...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
AbstractWe present a general framework for provably safe mobile code. It relies on a formal definiti...
We present a general framework for provably safe mobile code. It relies on a formal definition of a ...
We present an abstract machine that encodes both type safety and control safety in an efficient mann...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Many kinds of networked devices receive and execute new programs from various sources. Since we may ...
Abstract. Popular mobile code architectures (Java and.NET) include verifiers to check for memory saf...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
We present a novel transfer format for mobile programs that is a hybrid of two existing formats: byt...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract. Popular mobile code architectures (Java and.NET) include verifiers to check for memory saf...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
AbstractWe present a general framework for provably safe mobile code. It relies on a formal definiti...
We present a general framework for provably safe mobile code. It relies on a formal definition of a ...
We present an abstract machine that encodes both type safety and control safety in an efficient mann...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Many kinds of networked devices receive and execute new programs from various sources. Since we may ...
Abstract. Popular mobile code architectures (Java and.NET) include verifiers to check for memory saf...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
We present a novel transfer format for mobile programs that is a hybrid of two existing formats: byt...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...