메뉴 건너뛰기




Volumn , Issue , 2008, Pages 100-111

CMV: Automatic verification of complete mediation for java virtual machines

Author keywords

Complete mediation; Runtime monitoring

Indexed keywords

AUTOMATIC VERIFICATION; BYTECODES; JAVA BYTE CODES; JAVA LIBRARY; JAVA VIRTUAL MACHINES; MONITORING SYSTEM; RUNTIME MONITORING; SECURITY PROPERTIES; STANDARD LIBRARIES; SYSTEM SECURITY; SYSTEM VERIFICATIONS; VERIFICATION TECHNIQUES;

EID: 77952358659     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368327     Document Type: Conference Paper
Times cited : (11)

References (31)
  • 21
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, 2001.
    • (2001) USENIX Security Symposium
    • Larochelle, D.1    Evans, D.2
  • 25
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and S. M. D. The protection of information in computer systems. proceedings of the IEEE, September 1975.
    • (1975) Proceedings of the IEEE
    • Saltzer, J.1
  • 28
    • 0001956132 scopus 로고    scopus 로고
    • SOOT - A Java optimization framework
    • R. Vallée-Rai and L. H. et al. SOOT - a Java optimization framework. In Proceedings of CASCON 1999, pages 125-135, 1999.
    • (1999) Proceedings of CASCON 1999 , pp. 125-135
    • Vallée-Rai, R.1
  • 31
    • 85084161756 scopus 로고    scopus 로고
    • Using cqual for static analysis of authorization hook placement
    • X. Zhang, A. Edwards, and T. Jaeger. Using cqual for static analysis of authorization hook placement. In USENIX Security Symposium, 2002.
    • (2002) USENIX Security Symposium
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.