Extensible Untrusted Code Verification
نویسنده
چکیده
Extensible Untrusted Code Verification
منابع مشابه
Extensible Code Verification
Popular language-based security mechanisms for software systems are based on verifiers that enforce a fixed and trusted type system. We live in a multi-lingual world and no system is written entirely in a single strongly-typed language. Rather than seek the absolute most general type system, we propose a sound framework for customizing the mechanism (e.g., a type system or an explicit safety pr...
متن کاملRobust and Compositional Verification of Object Capability Pa erns
In scenarios such as web programming, where code is linked together from multiple sources, object capability patterns (OCPs) provide an essential safeguard, enabling programmers to protect the private state of their objects from corruption by unknown and untrusted code. However, the bene ts of OCPs in terms of program veri cation have never been properly formalized. In this paper, building on t...
متن کاملA Sound Framework for Untrusted Verification-Condition Generators
We propose a framework called configurable proofcarrying code, which allows the untrusted producer of mobile code to provide the bulk of the code verifier used by a code receiver to check the safety of the received code. The resulting system is both more flexible and also more trustworthy than a standard proof-carrying code system, because only a small part of the verifier needs to be trusted, ...
متن کاملDiscretionary Object Confinement: A Minimalist Approach to Capabilities for the JVM
Secure cooperation is the problem of protecting mutually suspicious code units from one another. The notion of capabilities is an effective means for facilitating secure cooperation in dynamically extensible software systems, in which both trusted and untrusted code may run alongside each other. This paper proposes a lightweight, statically enforceable type system, Discretionary Object Confinem...
متن کاملRE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms
A major challenge in software security is preserving software integrity. Traditionally, this problem is addressed through the development of software (self-) checking techniques that verify the integrity of its code and execution. Unfortunately, no satisfactory solutions for run-time verification of software integrity have been presented. In this paper, we approach the problem of run-time softw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004