Corrective enforcement: A new paradigm of security policy enforcement by monitors

R Khoury, N Tawbi - ACM Transactions on Information and System …, 2012 - dl.acm.org
Runtime monitoring is an increasingly popular method to ensure the safe execution of
untrusted codes. Monitors observe and transform the execution of these codes, responding …

Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting 1

M Ziadia, M Mejri, J Fattahi - New Trends in Intelligent Software …, 2021 - ebooks.iospress.nl
With the wide variety of applications offered by Android, this system has been able to
dominate the smartphone market. These applications provide all kinds of features and …

Enforcing Security Policies Using an Algebraic Approach

H Hounwanou, M Mejri - New Trends in Intelligent Software …, 2023 - ebooks.iospress.nl
The importance of information systems security in today's technology-driven world cannot be
overstated. Every organization, government, and business relies heavily on computer …

Formal enforcement of security policies on parallel systems with risk integration

M Ziadia, M Mejri - Codes, Cryptology, and Information Security: First …, 2015 - Springer
In this paper, we survey the problem of mobile security. Therefore, we introduce a formal
technique allowing the enforcement of security policy on this parallel system. The main idea …

FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test

G Sui, M Mejri - International Journal of Grid and Utility …, 2013 - inderscienceonline.com
A correct and a cheap enforcement of security policies on information systems is a major
problem for most of our institutions. In previous works, we introduced a program rewriting …

[PDF][PDF] Renforcement formel et automatique de politiques de sécurité dans des applications Android par réécriture

M Ziadia - 2022 - core.ac.uk
Résumé Autant les applications Android ont réussi à positionner Android parmi les
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …

Faser (formal and automatic security enforcement by rewriting): An algebraic approach

G Sui, M Mejri, HB Sta - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Recent research confirmed that program rewriting techniques are powerful mechanisms for
security enforcement, since they gather advantages of both static and dynamic approaches …

Automated detection of critical code in composite web services

I Hadded, M Langar, R Robbana - 2015 IEEE/ACIS 16th …, 2015 - ieeexplore.ieee.org
One of the important goals of the software development process is to verify that the produced
system always meets the predefined requirements. However, current testing approaches on …

Optimized inlining of runtime monitors

F Lemay, R Khoury, N Tawbi - Nordic Conference on Secure IT Systems, 2011 - Springer
A previous study showed how a monitor can be inlined into a potentially untrusted program,
producing an instrumented version of this program which provably respects the desired …

Rewriting-based security enforcement of concurrent systems: A formal approach

M Langar, M Mejri, K Adi - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Program security enforcement is designed to ensure that a program respects a given
security policy, which generally specifies the acceptable executions of that. In general, the …