[PDF][PDF] Permission re-delegation: Attacks and defenses.

AP Felt, HJ Wang, A Moshchuk, S Hanna… - USENIX security …, 2011 - usenix.org
Modern browsers and smartphone operating systems treat applications as mutually
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …

[PDF][PDF] Towards Taming Privilege-Escalation Attacks on Android.

S Bugiel, L Davi, A Dmitrienko, T Fischer… - …, 2012 - download.hrz.tu-darmstadt.de
Android's security framework has been an appealing subject of research in the last few
years. Android has been shown to be vulnerable to application-level privilege escalation …

[書籍][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

[PDF][PDF] Quire: Lightweight provenance for smart phone operating systems

M Dietz, S Shekhar, Y Pisetsky, A Shu… - USENIX security …, 2011 - usenix.org
Smartphone apps are often granted to privilege to run with access to the network and
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …

[PDF][PDF] SASI enforcement of security policies: A retrospective

U Erlingsson, FB Schneider - Proceedings of the 1999 workshop on New …, 1999 - dl.acm.org
Abstract SASI (_Security Automata _SFI _Implementation) enforces security policies by
modifying object code for a target system before that system is executed. The approach has …

IRM enforcement of Java stack inspection

U Erlingsson, FB Schneider - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
Two implementations are given for Java's stack inspection access-control policy. Each
implementation is obtained by generating an inlined reference monitor (IRM) for a different …

[書籍][B] The inlined reference monitor approach to security policy enforcement

Ú Erlingsson - 2004 - search.proquest.com
Embedding security enforcement code into applications is an alternative to traditional
security mechanisms. This dissertation supports the thesis that such Inlined Reference …

Formalizing the safety of Java, the Java virtual machine, and Java card

PH Hartel, L Moreau - ACM Computing Surveys (CSUR), 2001 - dl.acm.org
We review the existing literature on Java safety, emphasizing formal approaches, and the
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …

Secure program partitioning

S Zdancewic, L Zheng, N Nystrom… - ACM Transactions on …, 2002 - dl.acm.org
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …

Flexible policy-directed code safety

D Evans, A Twyman - … of the 1999 IEEE Symposium on Security …, 1999 - ieeexplore.ieee.org
The article introduces a new approach to code safety. We present Naccio, a system
architecture that allows a large class of safety policies to be expressed in a general and …