International audienceThis article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile system...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...
International audienceThis article describes an approach for the automated verification of mobile sy...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This article presents a semantic-based environment for reasoning about the behavior of mobile system...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
This article reports on our experiences in applying formal methods to verify the security mechanisms...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...
International audienceThis article describes an approach for the automated verification of mobile sy...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This article presents a semantic-based environment for reasoning about the behavior of mobile system...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
This article reports on our experiences in applying formal methods to verify the security mechanisms...
Mobile is an extension of the.NET Common Intermediate Lan-guage that supports certified In-Lined Ref...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...