Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Permission re-delegation: Attacks and defenses.
Modern browsers and smartphone operating systems treat applications as mutually
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …
[PDF][PDF] Towards Taming Privilege-Escalation Attacks on Android.
Android's security framework has been an appealing subject of research in the last few
years. Android has been shown to be vulnerable to application-level privilege escalation …
years. Android has been shown to be vulnerable to application-level privilege escalation …
[書籍][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
[PDF][PDF] Quire: Lightweight provenance for smart phone operating systems
Smartphone apps are often granted to privilege to run with access to the network and
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …
[PDF][PDF] SASI enforcement of security policies: A retrospective
Abstract SASI (_Security Automata _SFI _Implementation) enforces security policies by
modifying object code for a target system before that system is executed. The approach has …
modifying object code for a target system before that system is executed. The approach has …
IRM enforcement of Java stack inspection
Two implementations are given for Java's stack inspection access-control policy. Each
implementation is obtained by generating an inlined reference monitor (IRM) for a different …
implementation is obtained by generating an inlined reference monitor (IRM) for a different …
[書籍][B] The inlined reference monitor approach to security policy enforcement
Ú Erlingsson - 2004 - search.proquest.com
Embedding security enforcement code into applications is an alternative to traditional
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
Formalizing the safety of Java, the Java virtual machine, and Java card
We review the existing literature on Java safety, emphasizing formal approaches, and the
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …
confidential data during computation in distributed systems containing mutually untrusted …
Flexible policy-directed code safety
D Evans, A Twyman - … of the 1999 IEEE Symposium on Security …, 1999 - ieeexplore.ieee.org
The article introduces a new approach to code safety. We present Naccio, a system
architecture that allows a large class of safety policies to be expressed in a general and …
architecture that allows a large class of safety policies to be expressed in a general and …