The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
AbstractProof-carrying code (PCC) is a technique for downloading mobile code on a host machine while...
Proof Carrying Code (PCC) is a technique for downloading mobile code on a host machine while ensurin...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier aug...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
This dissertation presents a critical rethinking of the Java bytecode verification architecture from...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are augmente...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier au...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
AbstractProof-carrying code (PCC) is a technique for downloading mobile code on a host machine while...
Proof Carrying Code (PCC) is a technique for downloading mobile code on a host machine while ensurin...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier aug...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
This dissertation presents a critical rethinking of the Java bytecode verification architecture from...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are augmente...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
Modern computing platforms strive to support mobile code without putting system security at stake. T...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier au...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...