Java bytecode verification: algorithms and formalizations

X Leroy - Journal of Automated Reasoning, 2003 - Springer
Bytecode verification is a crucial security component for Java applets, on the Web and on
embedded devices such as smart cards. This paper reviews the various bytecode …

Refinement types for secure implementations

J Bengtson, K Bhargavan, C Fournet… - ACM Transactions on …, 2011 - dl.acm.org
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …

Java bytecode verification: an overview

X Leroy - … Aided Verification: 13th International Conference, CAV …, 2001 - Springer
Bytecode verification is a crucial security component for Java applets, on the Web and on
embedded devices such as smart cards. This paper describes the main bytecode verification …

[PDF][PDF] Access Control Based on Execution History.

M Abadi, C Fournet - NDSS, 2003 - cs.columbia.edu
Security is a major, frequent concern in extensible software systems such as Java Virtual
Machines and the Common Language Runtime. These systems aim to enable simple …

Stack-based access control and secure information flow

A Banerjee, DA Naumann - Journal of functional programming, 2005 - cambridge.org
Access control mechanisms are often used with the intent of enforcing confidentiality and
integrity policies, but few rigorous connections have been made between information flow …

A survey of static analysis methods for identifying security vulnerabilities in software systems

M Pistoia, S Chandra, SJ Fink, E Yahav - IBM systems journal, 2007 - ieeexplore.ieee.org
In this paper we survey static analysis methods for identifying security vulnerabilities in
software systems. We cover three areas that have been associated with sources of security …

Automated policy synthesis for system call sandboxing

S Pailoor, X Wang, H Shacham, I Dillig - Proceedings of the ACM on …, 2020 - dl.acm.org
System call whitelisting is a powerful sandboxing approach that can significantly reduce the
capabilities of an attacker if an application is compromised. Given a policy that specifies …

Access rights analysis for Java

L Koved, M Pistoia, A Kershenbaum - ACM Sigplan Notices, 2002 - dl.acm.org
Java 2 has a security architecture that protects systems from unauthorized access by mobile
or statically configured code. The problem is in manually determining the set of security …

Run-time principals in information-flow type systems

S Tse, S Zdancewic - ACM Transactions on Programming Languages …, 2007 - dl.acm.org
Information-flow type systems are a promising approach for enforcing strong end-to-end
confidentiality and integrity policies. Such policies, however, are usually specified in terms of …

[PDF][PDF] Typed operational reasoning

AM Pitts - Advanced Topics in Types and Programming …, 2005 - Citeseer
The aim of this chapter is to explain, by example, some methods for reasoning about
equivalence of programs based directly upon a type system and an operational semantics …