Mobile Code Security and Static Analysis
نویسنده
چکیده
منابع مشابه
MASSA: Mobile Agents Security through Static/Dynamic Analysis
Existing MASs suffer from security problems that must be solved, if mobile code is to be used in the development of mission-critical, real-world applications. In this paper we propose a framework that provides automated support for verification and analysis of MASs and allows for identifying security issues before the MASs are placed into action. The proposed approach is centered around an abst...
متن کاملStatic Program Analysis for Security
In this chapter, we discuss static analysis of the security of a system. First, we discuss the background on what types of static analysis is feasible in principle and then move on to what is practical. We next discuss static analysis of buffer overflow and mobile code followed by access control. Finally, we discuss static analysis of information flow expressed in a language that has been annot...
متن کاملA New Approach to Mobile Code Security
This dissertation presents a novel security architecture called security-passing style and motivates its application to security issues that arise in mobile code systems such as Java. Security-passing style, and its predecessor, stack inspection, allow the system to capture the complex security relationships that occur when trusted and untrusted code are run together and interact closely. Where...
متن کاملMobile Application Security in the Presence of Dynamic Code Updates
The increasing number of repeated malware penetrations into official mobile app markets poses a high security threat to the confidentiality and privacy of end users’ personal and sensitive information. Protecting end user devices from falling victims to adversarial apps presents a technical and research challenge for security researchers/engineers in academia and industry. Despite the security ...
متن کاملStatic Analysis of Security Properties in Mobile Ambients
Security is a major concern for computation in wide-area networks, and is often considered a serious source of potential limitation to a widespread use of mobile code technologies. This key issue has stimulated the research on efficient validation and verification techniques ensuring the acceptable behaviour of software components roaming around on information networks. In this dissertation, we...
متن کامل