Research on Proof-carrying Code for Mobile-code Security a Position Paper Darpa Workshop on Foundations for Secure Mobile Code

نویسندگان

  • Peter Lee
  • George Necula
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Management and Proof Carrying Code in Secure Mobile Code Applications A Position Paper

The popularity of the Java programming language and the concomittant media attention given to the security holes that have been found in the Java run time system have brought the problem of mobile code security to center stage in the computer science research world In this essay we describe how the concepts of trust management and proof carrying code might be used in mobile code applications to...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

Mobile Code Security

Mobile code is an exciting new technology. By its very nature, however, it is fraught with inherent security risks. In the paper, we give an overview of some of the techniques for securing mobile code environments that have been suggested and deployed. We examine the sandbox approach, code signing, hybrid approaches, rewalling techniques and proof carrying code. The relative merits of each appr...

متن کامل

Research on Proof-Carrying Code for Untrusted-Code Security

A powerful method of interaction between two software systems is through mobile code. By allowing code to be installed dynamically and then executed, a host system can provide a flexible means of access to its internal resources and services. There are many problems to be solved before such uses of untrusted code can become practical. For this position paper, we will focus on the problem of how...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997