咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 14 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 20 篇 java security
  • 5 篇 security
  • 3 篇 alloy
  • 3 篇 lightweight mode...
  • 2 篇 languages
  • 2 篇 and software ass...
  • 2 篇 invocation graph
  • 2 篇 static analysis
  • 2 篇 access rights
  • 2 篇 data flow analys...
  • 2 篇 call graph
  • 2 篇 web security
  • 2 篇 virtualization
  • 2 篇 jvm bytecode
  • 1 篇 exploits
  • 1 篇 safety requireme...
  • 1 篇 cascaded
  • 1 篇 security require...
  • 1 篇 access control
  • 1 篇 osgi

机构

  • 3 篇 boston univ dept...
  • 2 篇 ibm corp thomas ...
  • 1 篇 facebook 1 hacke...
  • 1 篇 pace univ ny 100...
  • 1 篇 fraunhofer iem p...
  • 1 篇 tech univ darmst...
  • 1 篇 korea adv inst s...
  • 1 篇 helwan univ fac ...
  • 1 篇 penn state univ ...
  • 1 篇 univ laval dept ...
  • 1 篇 pace university
  • 1 篇 oracle 4180 netw...
  • 1 篇 paderborn univ p...
  • 1 篇 fraunhofer iem h...
  • 1 篇 department of co...
  • 1 篇 univ paderborn p...
  • 1 篇 fortify software...
  • 1 篇 univ milan milan
  • 1 篇 univ virginia de...
  • 1 篇 suny stony brook...

作者

  • 3 篇 reynolds mark c.
  • 2 篇 kershenbaum a
  • 2 篇 bodden eric
  • 2 篇 pistoia m
  • 2 篇 koved l
  • 1 篇 brooks r
  • 1 篇 piskachev goran
  • 1 篇 lisa nguyen quan...
  • 1 篇 wang luyang
  • 1 篇 vignati edoardo
  • 1 篇 chen li-chiou
  • 1 篇 kandemir m
  • 1 篇 chiueh tc
  • 1 篇 nasr mona m.
  • 1 篇 bartel alexandre
  • 1 篇 irwin mj
  • 1 篇 jean sebastien
  • 1 篇 bruschi danilo
  • 1 篇 beznosov konstan...
  • 1 篇 chess brian

语言

  • 19 篇 英文
  • 1 篇 其他
检索条件"主题词=Java security"
20 条 记 录,以下是11-20 订阅
排序:
Practical delegation for secure distributed object environments
收藏 引用
Distributed Systems Engineering 1998年 第4期5卷 168-178页
作者: Nagaratnam, Nataraj Lea, Doug Department of Computer Engineering Syracuse University NY 13244 United States Department of Computer Science SUNY Oswego Oswego NY 13126 United States
SDM is a secure delegation model for java-based distributed object environments. SDM extends current java security features to support secure remote method invocations that may involve chains of delegated calls across... 详细信息
来源: 评论
Trusted Execution Path for Protecting java Applications Against Deserialization of Untrusted Data  21st
Trusted Execution Path for Protecting Java Applications Agai...
收藏 引用
21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
作者: Cristalli, Stefano Vignati, Edoardo Bruschi, Danilo Lanzi, Andrea Univ Milan Milan Italy
Deserialization of untrusted data is an issue in many programming languages. In particular, deserialization of untrusted data in java can lead to Remote Code Execution attacks. Conditions for this type of attack exist... 详细信息
来源: 评论
An In-Depth Study of More Than Ten Years of java Exploitation  16
An In-Depth Study of More Than Ten Years of Java Exploitatio...
收藏 引用
23rd ACM Conference on Computer and Communications security (CCS)
作者: Holzinger, Philipp Triller, Stefan Bartel, Alexandre Bodden, Eric Fraunhofer SIT Darmstadt Germany Tech Univ Darmstadt Darmstadt Germany Univ Paderborn Paderborn Germany Fraunhofer IEM Paderborn Germany
When created, the java platform was among the first runtimes designed with security in mind. Yet, numerous java versions were shown to contain far-reaching vulnerabilities, permitting denial-of-service attacks or even... 详细信息
来源: 评论
Code protection for resource-constrained embedded devices  04
Code protection for resource-constrained embedded devices
收藏 引用
Conference on Languages, Compilers and Tools for Embedded Systems
作者: Saputra, H Chen, G Brooks, R Vijaykrishnan, N Kandemir, M Irwin, MJ Penn State Univ Appl Res Lab University Pk PA 16802 USA
While the machine neutral java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. I... 详细信息
来源: 评论
AOLOA: a composable framework for third-party applications for smart home gateways  11
AOLOA: a composable framework for third-party applications f...
收藏 引用
11th IEEE International Conference on Services Computing (SCC)
作者: Simon, Eric Manjon, Albert Royo Jean, Sebastien Univ Grenoble Alpes LCIS CTSYS Res Grp F-26900 Valence France
In the last few years, the amount of smart devices in domestic environments has incredibly increased. Nowadays, a smart home is usually managed via a gateway offering value-added applications by connecting devices to ... 详细信息
来源: 评论
Access rights analysis for java  02
Access rights analysis for Java
收藏 引用
17th Meeting on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 2002)
作者: Koved, L Pistoia, M Kershenbaum, A IBM Corp Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
java(TM) 2 has a security architecture that protects systems from unauthorized access by mobile or statically configured code. The problem is in manually determining the set of security access rights required to execu... 详细信息
来源: 评论
Codebase-Adaptive Detection of security-Relevant Methods  2019
Codebase-Adaptive Detection of Security-Relevant Methods
收藏 引用
28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)
作者: Piskachev, Goran Lisa Nguyen Quang Do Bodden, Eric Fraunhofer IEM Hannover Germany Paderborn Univ Paderborn Germany
More and more companies use static analysis to perform regular code reviews to detect security vulnerabilities in their code, configuring them to detect various types of bugs and vulnerabilities such as the SANS top 2... 详细信息
来源: 评论
Inference of security-Sensitive Entities in Libraries  12
Inference of Security-Sensitive Entities in Libraries
收藏 引用
38th IEEE Symposium on security and Privacy (SP)
作者: Lu, Yi Bae, Sora Krishnan, Padmanabhan Raghavendra, K. R. Oracle Labs Brisbane Qld 4000 Australia Korea Adv Inst Sci & Technol Seoul South Korea
Programming languages such as java and C# execute code with different levels of trust in the same process, and rely on an access control model with fine-grained permissions to protect program code. Permissions are che... 详细信息
来源: 评论
Modeling the java Bytecode Verifier
Modeling the Java Bytecode Verifier
收藏 引用
2nd International Conference on Abstract State Machines (ASM), Alloy, B and Z
作者: Reynolds, Mark C. Boston Univ Dept Comp Sci Boston MA 02215 USA
The java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in java, particularly in the Bytecode Verifier, a critical c... 详细信息
来源: 评论
Access rights analysis for java
收藏 引用
ACM SIGPLAN NOTICES 2002年 第11期37卷 359-372页
作者: Koved, L Pistoia, M Kershenbaum, A IBM Corp Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
java(TM) 2 has a security architecture that protects systems from unauthorized access by mobile or statically configured code. The problem is in manually determining the set of security access rights required to execu... 详细信息
来源: 评论