International audienceInsecurity arising from illegal information flow represents a real threat in small computing environments allowing code sharing, dy- namic class loading and overloading. We introduce a verifier able to cer- tify at loading time Java applications already typed with signatures de- scribing possible information flows. The verifier is implemented as a class loader and can be used on any Java Virtual Machine. The experimental results provided here support our approach and show that the verifier can be successfully embedded. As far as we know, this is the first information flow analysis adapted to open embedded systems
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
International audiencePervasive computing is the next generation of comput- ing environments. As a r...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Information flow analysis is concerned with validating the security of information flows between obj...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
Information flow analysis is an approach to check whether there is no propagation of information tha...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
This paper presents a new approach to using dynamic information flow analysis to detect attacks agai...
Language-based information-flow security is concerned with specifying and enforcing security policie...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
International audienceInsecurity arising from illegal information flow represents a real threat in s...
International audiencePervasive computing is the next generation of comput- ing environments. As a r...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Information flow analysis is concerned with validating the security of information flows between obj...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
Information flow analysis is an approach to check whether there is no propagation of information tha...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Abstract: We present the JOANA (Java Object-sensitive ANAlysis) framework for information flow contr...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
This paper presents a new approach to using dynamic information flow analysis to detect attacks agai...
Language-based information-flow security is concerned with specifying and enforcing security policie...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
It is a common practice to retrieve code from an outside source, execute it and return the result to...