Security of mobile code is a major issue in today's global computing environment. When you download a program from an untrusted source, how can you be sure it will not do something undesirable? In this paper I will discuss a particular approach to this problem called language-based security. In this approach, security information is derived from a program written in a high-level language during the compilation process and is included in the compiled object. This extra security information can take the form of a formal proof, a type annotation, or some other form of certificate or annotation. It can be downloaded along with the object code and automatically verified before running the code locally, giving some assurance against certain t...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Most of the software that we depend upon, including operating systems, communication stacks, file sy...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Dynamic compilation often comes at the price of reduced code quality, because there is not enough ti...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Abstract To offload the computational burden of bytecode verification within Java Virtual Machines (...
Many kinds of networked devices receive and execute new programs from various sources. Since we may ...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Most of the software that we depend upon, including operating systems, communication stacks, file sy...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Dynamic compilation often comes at the price of reduced code quality, because there is not enough ti...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Abstract To offload the computational burden of bytecode verification within Java Virtual Machines (...
Many kinds of networked devices receive and execute new programs from various sources. Since we may ...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Most of the software that we depend upon, including operating systems, communication stacks, file sy...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...