D Hedin, D Sands - 19th IEEE Computer Security Foundations …, 2006 - ieeexplore.ieee.org
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque-ie, that the only properties that can be observed of …
RR Hansen, CW Probst - 6th International Workshop on Issues in the …, 2006 - imm.dtu.dk
Non-interference is the property of a program not to leak any secret information. In this paper we propose a notion of non-interference for an abstract version of the Java Card bytecode …
HS Karlsen, ER Wognsen, MC Olesen… - Informal proceedings of …, 2012 - Citeseer
With the large, and rapidly increasing, number of smartphones based on the Android platform, combined with the open nature of the platform that allows “apps” to be downloaded …
MCL CHRISTENSEN, SE LARSEN, SAH BJERGMARK… - 2018 - projekter.aau.dk
Finding Data Leaks in Xamarin Apps by Performing Taint Analysis on CIL Code Page 1 Finding Data Leaks in Xamarin Apps by Performing Taint Analysis on CIL Code DEIS1027F18 MIKKEL …
The transistors in computers are decreasing in physical size for every generation resulting in an increased susceptibility to single event upsets. The rate of single event upsets causing an …
This report documents the development of a fault-tolerant version of the programming language TinyBytecode, as well as a virtual machine which can execute it. A fault-tolerance …
RR Hansen - Programming Language Interference and …, 2005 - homes.cs.aau.dk
Smart cards have found widespread use in applications with stringent requirements on handling secret or private information in a safe and secure manner, eg, electronic purses …