Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3MS project uses policies, monitoring, and monitor inlining to secure third-party applications running on mobile devices. The focus of this paper is on multi-threaded Java bytecode. An important consideration is that inlining should interfere with the client program only when mandated by the security policy. In a multi-threaded setting, however, this requirement turns out to be problematic. Generally, inliners use locks to control access to shared resources such as an embedded monitor state. This will interfere with application program non-determinism due to Java's relaxed memory c...
Abstract. Concurrent data accesses in high-level languages like Java and C # are typically mediated ...
Abstract We provide a parametric framework for verifying safety properties of concurrent Java progra...
Abstract. Runtime security policy enforcement systems are crucial to limit the risks associated with...
Inline reference monitoring is a powerful technique to enforce secu-rity policies on untrusted progr...
© 2014 Cambridge University Press. Security monitor inlining is a technique for security policy enfo...
Monitor inlining is a program rewriting technique to enforce security policy to an untrusted program...
iii Reference monitor inlining is a technique for enforcing security policies by injecting security ...
Reference monitor inlining is a technique for enforcing security policies by injecting security chec...
Abstract. Runtime monitoring is an established technique for enforc-ing a wide range of program safe...
Abstract. Runtime monitoring is an established technique for enforc-ing a wide range of program safe...
AbstractRuntime monitoring is an established technique to enforce a wide range of program safety and...
Embedding security enforcement code into applications is an alternative to traditional security mec...
Embedding security enforcement code into applications is an alternative to tradi-tional security mec...
Runtime security policy enforcement systems are crucial to limit the risks associated with running u...
Runtime security policy enforcement systems are crucial to limit the risks associated with running u...
Abstract. Concurrent data accesses in high-level languages like Java and C # are typically mediated ...
Abstract We provide a parametric framework for verifying safety properties of concurrent Java progra...
Abstract. Runtime security policy enforcement systems are crucial to limit the risks associated with...
Inline reference monitoring is a powerful technique to enforce secu-rity policies on untrusted progr...
© 2014 Cambridge University Press. Security monitor inlining is a technique for security policy enfo...
Monitor inlining is a program rewriting technique to enforce security policy to an untrusted program...
iii Reference monitor inlining is a technique for enforcing security policies by injecting security ...
Reference monitor inlining is a technique for enforcing security policies by injecting security chec...
Abstract. Runtime monitoring is an established technique for enforc-ing a wide range of program safe...
Abstract. Runtime monitoring is an established technique for enforc-ing a wide range of program safe...
AbstractRuntime monitoring is an established technique to enforce a wide range of program safety and...
Embedding security enforcement code into applications is an alternative to traditional security mec...
Embedding security enforcement code into applications is an alternative to tradi-tional security mec...
Runtime security policy enforcement systems are crucial to limit the risks associated with running u...
Runtime security policy enforcement systems are crucial to limit the risks associated with running u...
Abstract. Concurrent data accesses in high-level languages like Java and C # are typically mediated ...
Abstract We provide a parametric framework for verifying safety properties of concurrent Java progra...
Abstract. Runtime security policy enforcement systems are crucial to limit the risks associated with...