AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set of permissions granted/denied to code at run-time. This static information helps optimizing the implementation of the stack inspection algorithm
This paper presents the enforcement of control flow policies for Java bytecode devoted to open and c...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
In this thesis we study the static analysis of Java bytecode and its semantics foundations. The init...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
This paper presents the enforcement of control flow policies for Java bytecode devoted to open and c...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
In this thesis we study the static analysis of Java bytecode and its semantics foundations. The init...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
This paper presents the enforcement of control flow policies for Java bytecode devoted to open and c...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...