Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

[HTML][HTML] SoK: Run-time security for cloud microservices. Are we there yet?

F Minna, F Massacci - Computers & Security, 2023 - Elsevier
The adoption of microservice architecture is rapidly growing, involving industries of every
size. Their ability to scale and reconstitute complex functionalities into small, cohesive, and …

Introduction to runtime verification

E Bartocci, Y Falcone, A Francalanza… - Lectures on Runtime …, 2018 - Springer
The aim of this chapter is to act as a primer for those wanting to learn about Runtime
Verification (RV). We start by providing an overview of the main specification languages …

Control-flow integrity principles, implementations, and applications

M Abadi, M Budiu, U Erlingsson, J Ligatti - ACM Transactions on …, 2009 - dl.acm.org
Current software attacks often build on exploits that subvert machine-code execution. The
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …

Boxify: Full-fledged app sandboxing for stock android

M Backes, S Bugiel, C Hammer, O Schranz… - 24th USENIX Security …, 2015 - usenix.org
We present the first concept for full-fledged app sandboxing on stock Android. Our approach
is based on application virtualization and process-based privilege separation to securely …

Appguard–enforcing user requirements on android apps

M Backes, S Gerling, C Hammer, M Maffei… - … 2013, Held as Part of the …, 2013 - Springer
The success of Android phones makes them a prominent target for malicious software, in
particular since the Android permission system turned out to be inadequate to protect the …

Combining word embedding with information retrieval to recommend similar bug reports

X Yang, D Lo, X **a, L Bao, J Sun - 2016 IEEE 27Th …, 2016 - ieeexplore.ieee.org
Similar bugs are bugs that require handling of many common code files. Developers can
often fix similar bugs with a shorter time and a higher quality since they can focus on fewer …

[PDF][PDF] Contextual policy enforcement in android applications with permission event graphs.

KZ Chen, NM Johnson, V D'Silva, S Dai, K MacNamara… - Ndss, 2013 - lilicoding.github.io
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

IRM enforcement of Java stack inspection

U Erlingsson, FB Schneider - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
Two implementations are given for Java's stack inspection access-control policy. Each
implementation is obtained by generating an inlined reference monitor (IRM) for a different …

Run-time enforcement of nonsafety policies

J Ligatti, L Bauer, D Walker - ACM Transactions on Information and …, 2009 - dl.acm.org
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …