Enforcing high-level security properties for applets

M Pavlova, G Barthe, L Burdy, M Huisman… - … /WG8. 8 & TC11/WG11. 2 …, 2004 - Springer
Smart card applications often handle privacy-sensitive information, and therefore must obey
certain security policies. Typically, such policies are described as high-level security …

Renewable Just-In-Time Control-Flow Integrity

E Bauman, J Duan, KW Hamlen, Z Lin - Proceedings of the 26th …, 2023 - dl.acm.org
Renew (Rewriting Newly Executable pages after Writes) unites and extends recent
advances in binary code analysis and transformation to solve a longstanding compatibility …

Extending the enforcement power of truncation monitors using static analysis

H Chabot, R Khoury, N Tawbi - computers & security, 2011 - Elsevier
Runtime monitors are a widely used approach to enforcing security policies. Truncation
monitors are based on the idea of truncating an execution before a violation occurs. Thus …

Augmenting deep neural networks with scenario-based guard rules

G Katz - Model-Driven Engineering and Software Development …, 2021 - Springer
Deep neural networks (DNNs) are becoming widespread, and can often outperform
manually-created systems. However, these networks are typically opaque to humans, and …

Security monitor inlining for multithreaded Java

M Dam, B Jacobs, A Lundblad, F Piessens - … , Genoa, Italy, July 6-10, 2009 …, 2009 - Springer
Program monitoring is a well-established and efficient approach to security policy
enforcement. An implementation of program monitoring that is particularly appealing for …

Synthesizing enforcement monitors wrt. the safety-progress classification of properties

Y Falcone, JC Fernandez, L Mounier - Information Systems Security: 4th …, 2008 - Springer
Runtime enforcement is a powerful technique to ensure that a program will respect a given
security policy. We extend previous works on this topic in several directions. Firstly, we …

On the expressiveness and complexity of randomization in finite state monitors

R Chadha, AP Sistla, M Viswanathan - Journal of the ACM (JACM), 2009 - dl.acm.org
In this article, we introduce the model of finite state probabilistic monitors (FPM), which are
finite state automata on infinite strings that have probabilistic transitions and an absorbing …

[PDF][PDF] On safety properties and their monitoring

G Rosu - Scientific Annals of Computer Science, 2012 - info.uaic.ro
This paper addresses the problem of runtime verification from a foundational perspective,
answering questions like “Is there a consensus among the various definitions of a safety …

Corrective enforcement: A new paradigm of security policy enforcement by monitors

R Khoury, N Tawbi - ACM Transactions on Information and System …, 2012 - dl.acm.org
Runtime monitoring is an increasingly popular method to ensure the safe execution of
untrusted codes. Monitors observe and transform the execution of these codes, responding …

[PDF][PDF] Policy Enforcement Framework for Cloud Data Management.

KW Hamlen, L Kagal, M Kantarcioglu - IEEE Data Eng. Bull., 2012 - Citeseer
Cloud computing is a major emerging technology that is significantly changing industrial
computing paradigms and business practices. However, security and privacy concerns have …