This paper introduces the java byte code file encryption to protect the relevant technology, the protection of java technology confusing, Class Loader class encryption technology, a detailed study, given the general J...
详细信息
This paper introduces the java byte code file encryption to protect the relevant technology, the protection of java technology confusing, Class Loader class encryption technology, a detailed study, given the general java class file format, by proof of actual use, java words bytecode file encryption with the confidentiality, security and good performance, in line with safety requirements in the communications group, has broad application prospects.
Proof-carrying code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We show how certified abstract interpretation can be used to...
详细信息
Proof-carrying code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We show how certified abstract interpretation can be used to build a PCC architecture where the code producer can produce program certificates automatically. code consumers use proof checkers derived from certified analysers to check certificates. Proof checkers carry their own correctness proofs and accepting a new proof checker amounts to type checking the checker in Coq. Certificates take the form of strategies for reconstructing a fixpoint and are kept small due to a technique for fixpoint compression. The PCC architecture has been implemented and evaluated experimentally on a bytecode language for which we have designed an interval analysis that allows to generate certificates ascertaining that no array-out-of-bounds accesses will occur. (C) 2006 Elsevier B.V. All rights reserved.
A number of essential issues in translating Smalltalk to java are addressed. A convention is proposed for mapping Smalltalk method selectors to java method names. In addition, a java class hierarchy that parallels the...
详细信息
ISBN:
(纸本)3540643044
A number of essential issues in translating Smalltalk to java are addressed. A convention is proposed for mapping Smalltalk method selectors to java method names. In addition, a java class hierarchy that parallels the Smalltalk class hierarchy (including the metaclass objects) is suggested These proposals are used to support ways of mapping both Smalltalk instance and class methods to their java counterparts.
While the machine neutral javabytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. I...
详细信息
ISBN:
(纸本)9781581138061
While the machine neutral javabytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are-several tools to reverse engineer javabytecodes. The focus of this work is the design of a substitution-based bytecode obfuscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.
The presented policy-based management system supports autonomous control and adaptation of a distributed system according to changing conditions and requirements by means of event-condition-action (ECA) rules. Further...
详细信息
The paper describes an experiment in which a framework for model checking java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness proper...
详细信息
The paper describes an experiment in which a framework for model checking java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness properties of a java Card applet.
暂无评论