We consider ensuring the security of executed mobile code by applying runtime monitoring. Of the many approaches for code security, the runtime monitoring approach is perhaps the most general and flexible. We have formerly implemented a rule-based language for describing runtime security policies, and now we discuss the verification of those policies. A security policy can be considered as a specification that restricts the execution of a program in some way. These restrictions can be connected to the program state and the execution history. In this paper, we introduce invariant expressions for our security monitor descriptions, and describe a methodology for proving that the monitor preserves its invariant. Our invariant expressions...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
AbstractThis paper describes the S3MS.NET run time monitor, a tool that can enforce security policie...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
International audienceThe underlying property, its definition and representation play a major role w...
Mobile applications are verified to check the correctness or evaluated to check the performance with...
Runtime techniques bring new promises of accuracy and flexibility in enforcing security policies. Wh...
The underlying property, its definition and representation play a major role when monitoring a syste...
There is increasing demand for running multiple times a number of interacting applications in a secu...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Abstract. The underlying property, its definition and representation play a major role when monitori...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
This article describes an approach for the automated verification of mobile systems. Mobile systems ...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
AbstractThis paper describes the S3MS.NET run time monitor, a tool that can enforce security policie...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
International audienceThe underlying property, its definition and representation play a major role w...
Mobile applications are verified to check the correctness or evaluated to check the performance with...
Runtime techniques bring new promises of accuracy and flexibility in enforcing security policies. Wh...
The underlying property, its definition and representation play a major role when monitoring a syste...
There is increasing demand for running multiple times a number of interacting applications in a secu...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Abstract. The underlying property, its definition and representation play a major role when monitori...
This paper describes an approach for the automated verification of mobile programs. Mobile systems a...
This article describes an approach for the automated verification of mobile systems. Mobile systems ...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
AbstractThis paper describes the S3MS.NET run time monitor, a tool that can enforce security policie...