[HTML][HTML] Formalisation and analysis of Dalvik bytecode

ER Wognsen, HS Karlsen, MC Olesen… - Science of Computer …, 2014 - Elsevier
With the large, and rapidly increasing, number of smartphones based on the Android
platform, combined with the open nature of the platform that allows “apps” to be downloaded …

Noninterference in the presence of non-opaque pointers

D Hedin, D Sands - 19th IEEE Computer Security Foundations …, 2006 - ieeexplore.ieee.org
A common theoretical assumption in the study of information flow security in Java-like
languages is that pointers are opaque-ie, that the only properties that can be observed of …

[PDF][PDF] Non-interference and erasure policies for java card bytecode

RR Hansen, CW Probst - 6th International Workshop on Issues in the …, 2006 - imm.dtu.dk
Non-interference is the property of a program not to leak any secret information. In this paper
we propose a notion of non-interference for an abstract version of the Java Card bytecode …

[PDF][PDF] Study, formalisation, and analysis of dalvik bytecode

HS Karlsen, ER Wognsen, MC Olesen… - Informal proceedings of …, 2012 - Citeseer
With the large, and rapidly increasing, number of smartphones based on the Android
platform, combined with the open nature of the platform that allows “apps” to be downloaded …

[PDF][PDF] Finding Data Leaks in Xamarin Apps by Performing Taint Analysis on CIL Code

MCL CHRISTENSEN, SE LARSEN, SAH BJERGMARK… - 2018 - projekter.aau.dk
Finding Data Leaks in Xamarin Apps by Performing Taint Analysis on CIL Code Page 1 Finding
Data Leaks in Xamarin Apps by Performing Taint Analysis on CIL Code DEIS1027F18 MIKKEL …

[PDF][PDF] Black One Sugar

M Fjordvald, S Lybæk - projekter.aau.dk
The transistors in computers are decreasing in physical size for every generation resulting in
an increased susceptibility to single event upsets. The rate of single event upsets causing an …

[PDF][PDF] TinyVM: A Fault-Tolerant Virtual Machine

M Sørensen, R Hansen - 2014 - projekter.aau.dk
This report documents the development of a fault-tolerant version of the programming
language TinyBytecode, as well as a virtual machine which can execute it. A fault-tolerance …

[PDF][PDF] Non-Interference and Simple Erasure Policies for Java Card Bytecode

RR Hansen - Programming Language Interference and …, 2005 - homes.cs.aau.dk
Smart cards have found widespread use in applications with stringent requirements on
handling secret or private information in a safe and secure manner, eg, electronic purses …