International audiencePervasive computing is the next generation of comput- ing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java byte- code adapted for applications dedicated to embedded sys- tems. Existing techniques are not well adapted to this do- main and are often too complex. To ease embedded oper- ations and reduce overhead, an external static analysis is performed initially, and the results are embedded as anno- tations within the code and certified at loading time. In con- trast with other analysis techniqu...
It is becoming more and more important to study methods for protecting sensitive data in computer an...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
AbstractJust-in-Time (JIT) compilation is frequently employed in order to speed-up the execution of ...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
Information flow analysis is concerned with validating the security of information flows between obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
This paper presents a new approach to using dynamic information flow analysis to detect attacks agai...
Information flow analysis is an approach to check whether there is no propagation of information tha...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
Abstract:- The security of information systems has been the focus because of network applications. V...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
This paper shows how data flow analysis can be used to infer type information related to Java byteco...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
It is becoming more and more important to study methods for protecting sensitive data in computer an...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
AbstractJust-in-Time (JIT) compilation is frequently employed in order to speed-up the execution of ...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
Information flow analysis is concerned with validating the security of information flows between obj...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
This paper presents a new approach to using dynamic information flow analysis to detect attacks agai...
Information flow analysis is an approach to check whether there is no propagation of information tha...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
Abstract:- The security of information systems has been the focus because of network applications. V...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
This paper shows how data flow analysis can be used to infer type information related to Java byteco...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
It is becoming more and more important to study methods for protecting sensitive data in computer an...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
AbstractJust-in-Time (JIT) compilation is frequently employed in order to speed-up the execution of ...