The growing dependence of our society and economy on networked information systems makes it essential to protect our confidential data from being leaked by malicious code. Downloading and executing code (possibly from untrusted sources) has become a daily event. Modern operating systems load code for adding new functionalities; web browsers download plug-ins and applets; end-users download untrusted code for doing some useful tasks. Certification that the untrusted code respects the confidentiality of data it manipulates is essential in these situations. Thus it is necessary to analyze how information flows within that program. This thesis presents an approach to enable end-users to determine whether untrusted mobile code will respect pre-...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Recent approaches to mobile code safety, like proof- arrying code, involve associating safety inform...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
An approach enabling end-users to verify that a downloaded untrusted code will not leak confidential...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
With the growing amount of data handled by Internet-enabled mobile devices, the task of preventing s...
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consum...
Current approaches to mobile code safety – inspired by the technique of Proof-Carrying Code (PCC) [4...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This chapter discusses how to ensure confidentiality and integrity for data flow in IoT applications...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Recent approaches to mobile code safety, like proof- arrying code, involve associating safety inform...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
An approach enabling end-users to verify that a downloaded untrusted code will not leak confidential...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
With the growing amount of data handled by Internet-enabled mobile devices, the task of preventing s...
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consum...
Current approaches to mobile code safety – inspired by the technique of Proof-Carrying Code (PCC) [4...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
This chapter discusses how to ensure confidentiality and integrity for data flow in IoT applications...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Recent approaches to mobile code safety, like proof- arrying code, involve associating safety inform...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...