Process-based separation has long been the prevalent model for providing security and isolation to protection domains in computer systems. However, the recent rise of component-based systems, which execute multiple plug-ins in the same process, has exposed a weakness of processes. At the same time, the recent spate of vulnerabilities in software has revealed the usefulness of language-based schemes to supplement the protections offered by processes. I propose a language-based protection model to replace processes as the basis for providing security and isolation. In this thesis, I present three different language-based mechanisms which add particular operating system-style protection semantics to the language. Soft termination provides a me...
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing s...
This paper is centered around the design of a thread- and memory-safe language, primarily for the co...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
150 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1982.One of the problems in buildi...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Safe language technology can be used for protection within a single address space. This protection ...
Modern software systems are commonly programmed in multiple languages. Research into the security an...
We present an operating system-level security model for controlling ne-grained programs, such asdown...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
The combination of (1) hard to eradicate low-level vulnerabilities, (2) a large trusted computing ba...
As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, m...
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing s...
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing s...
This paper is centered around the design of a thread- and memory-safe language, primarily for the co...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
The use of language mechanisms to enforce protection boundaries around software modules has become i...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
150 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1982.One of the problems in buildi...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Safe language technology can be used for protection within a single address space. This protection ...
Modern software systems are commonly programmed in multiple languages. Research into the security an...
We present an operating system-level security model for controlling ne-grained programs, such asdown...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
The combination of (1) hard to eradicate low-level vulnerabilities, (2) a large trusted computing ba...
As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, m...
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing s...
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing s...
This paper is centered around the design of a thread- and memory-safe language, primarily for the co...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...