Abstract: The contemporary approach to enrich the functionality of various devices is to make them programmable, and enable the users to install new features in the form of mobile code. For example, socalled smartphones are equipped with a basic set of applications, but the manufacturers and operators provide a lot of applications that can be later downloaded and installed. The expanding use of mobile code has emerged security concerns, since mobile code may also contain undesirable features. For finding the possible security weaknesses, we present our code monitoring solution in the context of J2ME (Java2 Micro Edition). We first describe our modular policy language for expressing simple rule based security policies. The policies are trans...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Users and providers of an information system should clearly understand the threats caused by the sys...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
There is increasing demand for running multiple times a number of interacting applications in a secu...
We consider ensuring the security of executed mobile code by applying runtime monitoring. Of the ...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Users and providers of an information system should clearly understand the threats caused by the sys...
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive indus...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Users and providers of an information system should clearly understand the threats caused by the sys...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
There is increasing demand for running multiple times a number of interacting applications in a secu...
We consider ensuring the security of executed mobile code by applying runtime monitoring. Of the ...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Users and providers of an information system should clearly understand the threats caused by the sys...
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive indus...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...