Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Formal approaches to secure compilation: A survey of fully abstract compilation and related work
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …
properties of the source programs they take as input in the target programs they produce as …
[HTML][HTML] SoK: Run-time security for cloud microservices. Are we there yet?
F Minna, F Massacci - Computers & Security, 2023 - Elsevier
The adoption of microservice architecture is rapidly growing, involving industries of every
size. Their ability to scale and reconstitute complex functionalities into small, cohesive, and …
size. Their ability to scale and reconstitute complex functionalities into small, cohesive, and …
Introduction to runtime verification
The aim of this chapter is to act as a primer for those wanting to learn about Runtime
Verification (RV). We start by providing an overview of the main specification languages …
Verification (RV). We start by providing an overview of the main specification languages …
Control-flow integrity principles, implementations, and applications
Current software attacks often build on exploits that subvert machine-code execution. The
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …
Boxify: Full-fledged app sandboxing for stock android
We present the first concept for full-fledged app sandboxing on stock Android. Our approach
is based on application virtualization and process-based privilege separation to securely …
is based on application virtualization and process-based privilege separation to securely …
Appguard–enforcing user requirements on android apps
The success of Android phones makes them a prominent target for malicious software, in
particular since the Android permission system turned out to be inadequate to protect the …
particular since the Android permission system turned out to be inadequate to protect the …
Combining word embedding with information retrieval to recommend similar bug reports
Similar bugs are bugs that require handling of many common code files. Developers can
often fix similar bugs with a shorter time and a higher quality since they can focus on fewer …
often fix similar bugs with a shorter time and a higher quality since they can focus on fewer …
[PDF][PDF] Contextual policy enforcement in android applications with permission event graphs.
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …
characterised by context and sequence in which certain permissions and APIs are used. We …
IRM enforcement of Java stack inspection
Two implementations are given for Java's stack inspection access-control policy. Each
implementation is obtained by generating an inlined reference monitor (IRM) for a different …
implementation is obtained by generating an inlined reference monitor (IRM) for a different …
Run-time enforcement of nonsafety policies
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …
run time and check that they dynamically adhere to constraints specified by a security policy …