Formalizing the safety of Java, the Java virtual machine, and Java card

PH Hartel, L Moreau - ACM Computing Surveys (CSUR), 2001 - dl.acm.org
We review the existing literature on Java safety, emphasizing formal approaches, and the
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …

[图书][B] Java security: writing and deploying secure applications

S Oaks - 2001 - books.google.com
One of Java's most striking claims is that it provides a secure programming environment. Yet
despite endless discussion, few people understand precisely what Java's claims mean and …

[PDF][PDF] Security properties and Java Card specificities to be studied in the SecSafe project

R Marlet, D Le Métayer - 2001 - academia.edu
This report describes security properties to be studied in the SecSafe project. These
properties are to be checked by static analyses. The current version of the document only …

[图书][B] Securing Java: getting down to business with mobile code

G McGraw, EW Felten - 1999 - dl.acm.org
McGraw and Felton provide an accessible overview of Java security issues. The first chapter
introduces problems related to mobile code security and approaches based on the sandbox …

Robusta: Taming the native beast of the JVM

J Siefers, G Tan, G Morrisett - Proceedings of the 17th ACM conference …, 2010 - dl.acm.org
Java applications often need to incorporate native-code components for efficiency and for
reusing legacy code. However, it is well known that the use of native code defeats Java's …

Use at your own risk: The java unsafe api in the wild

L Mastrangelo, L Ponzanelli, A Mocci, M Lanza… - ACM Sigplan …, 2015 - dl.acm.org
Java is a safe language. Its runtime environment provides strong safety guarantees that any
Java application can rely on. Or so we think. We show that the runtime actually does not …

Bringing java's wild native world under control

M Sun, G Tan, J Siefers, B Zeng… - ACM Transactions on …, 2013 - dl.acm.org
For performance and for incorporating legacy libraries, many Java applications contain
native-code components written in unsafe languages such as C and C++. Native-code …

[PDF][PDF] A specification of Java loading and bytecode verification

A Goldberg - Proceedings of the 5th ACM Conference on Computer …, 1998 - dl.acm.org
A specification of Java loading and bytecode verification Page 1 A Specification of Java
Loading and Bytecode Verification Allen Goldberg Kestrel Institute 3260 HillviewAv. Palo Alto …

[PDF][PDF] Java security architecture (JDK 1.2)

L Gong - Draft Document, revision 0.8, Sun Microsystems, March, 1998 - sai.msu.su
Java™SecurityArchitecture(JDK1.2) Page 1 Java™SecurityArchitecture(JDK1.2) Author: Li
Gong (li.gong@sun.com) Date: October 2, 1998 Version 1.0 This document gives an overview of …

[PDF][PDF] A simple semantics and static analysis for Java security

A Banerjee, DA Naumann - Cs report, 2001 - Citeseer
Security in Java depends on an access control mechanism specified operationally in terms
of run-time stack inspection. We give a denotational semantics in “eager” form, and show …