Corrective enforcement: A new paradigm of security policy enforcement by monitors
Runtime monitoring is an increasingly popular method to ensure the safe execution of
untrusted codes. Monitors observe and transform the execution of these codes, responding …
untrusted codes. Monitors observe and transform the execution of these codes, responding …
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting 1
With the wide variety of applications offered by Android, this system has been able to
dominate the smartphone market. These applications provide all kinds of features and …
dominate the smartphone market. These applications provide all kinds of features and …
Enforcing Security Policies Using an Algebraic Approach
H Hounwanou, M Mejri - New Trends in Intelligent Software …, 2023 - ebooks.iospress.nl
The importance of information systems security in today's technology-driven world cannot be
overstated. Every organization, government, and business relies heavily on computer …
overstated. Every organization, government, and business relies heavily on computer …
Formal enforcement of security policies on parallel systems with risk integration
M Ziadia, M Mejri - Codes, Cryptology, and Information Security: First …, 2015 - Springer
In this paper, we survey the problem of mobile security. Therefore, we introduce a formal
technique allowing the enforcement of security policy on this parallel system. The main idea …
technique allowing the enforcement of security policy on this parallel system. The main idea …
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
G Sui, M Mejri - International Journal of Grid and Utility …, 2013 - inderscienceonline.com
A correct and a cheap enforcement of security policies on information systems is a major
problem for most of our institutions. In previous works, we introduced a program rewriting …
problem for most of our institutions. In previous works, we introduced a program rewriting …
[PDF][PDF] Renforcement formel et automatique de politiques de sécurité dans des applications Android par réécriture
M Ziadia - 2022 - core.ac.uk
Résumé Autant les applications Android ont réussi à positionner Android parmi les
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …
Faser (formal and automatic security enforcement by rewriting): An algebraic approach
Recent research confirmed that program rewriting techniques are powerful mechanisms for
security enforcement, since they gather advantages of both static and dynamic approaches …
security enforcement, since they gather advantages of both static and dynamic approaches …
Automated detection of critical code in composite web services
I Hadded, M Langar, R Robbana - 2015 IEEE/ACIS 16th …, 2015 - ieeexplore.ieee.org
One of the important goals of the software development process is to verify that the produced
system always meets the predefined requirements. However, current testing approaches on …
system always meets the predefined requirements. However, current testing approaches on …
Optimized inlining of runtime monitors
A previous study showed how a monitor can be inlined into a potentially untrusted program,
producing an instrumented version of this program which provably respects the desired …
producing an instrumented version of this program which provably respects the desired …
Rewriting-based security enforcement of concurrent systems: A formal approach
Program security enforcement is designed to ensure that a program respects a given
security policy, which generally specifies the acceptable executions of that. In general, the …
security policy, which generally specifies the acceptable executions of that. In general, the …