메뉴 건너뛰기




Volumn 16, Issue 3, 2013, Pages

Bringing Java's wild native world under control

Author keywords

[No Author keywords available]

Indexed keywords

JAVA APPLICATIONS; JAVA COMPONENTS; JAVA NATIVE INTERFACES; JAVA VIRTUAL MACHINES; PERFORMANCE DEGRADATION; RUNTIME OVERHEADS; SECURITY FRAMEWORKS; SECURITY THREATS;

EID: 84890392640     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2535505     Document Type: Article
Times cited : (13)

References (58)
  • 7
    • 34547351378 scopus 로고    scopus 로고
    • Heap protection for Java virtual machines
    • DOI 10.1145/1168054.1168069, ACM International Conference Proceeding Series - Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java, PPPJ 2006
    • CHIBA, Y. 2006. Heap protection for java virtual machines. In Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java. 103-112. (Pubitemid 47142497)
    • (2006) ACM International Conference Proceeding Series , vol.178 , pp. 103-112
    • Chiba, Y.1
  • 8
    • 33751067472 scopus 로고    scopus 로고
    • A safety-oriented platform for Web applications
    • DOI 10.1109/SP.2006.4, 1624025, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • COX, R. S.,GRIBBLE, S. D.,LEVY, H. M., AND HANSEN, J. G. 2006. A safety-oriented platform for web applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P'06). 350-364. (Pubitemid 44753736)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 350-364
    • Cox, R.S.1    Hansen, J.G.2    Gribble, S.D.3    Levy, H.M.4
  • 32
    • 84890400270 scopus 로고    scopus 로고
    • MITRE CVE-2012-4681
    • MITRE. 2012. CVE-2012-4681. http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2012-4681.
    • (2012)
  • 33
    • 84890401109 scopus 로고    scopus 로고
    • CVE-2013-0422
    • MITRE. 2013. CVE-2013-0422. http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2013-0422.
    • (2013) MITRE
  • 38
    • 84856438444 scopus 로고    scopus 로고
    • Capabilities revisited: A holistic approach to bottom-to-top assurance of trustworthy systems
    • NEUMANN, P. AND WATSON, R. 2010. Capabilities revisited: A holistic approach to bottom-to-top assurance of trustworthy systems. In Proceedings of the 4th Layered Assurance Workshop.
    • (2010) Proceedings of the 4th Layered Assurance Workshop
    • Neumann, P.1    Watson, R.2
  • 39
    • 35248884899 scopus 로고    scopus 로고
    • ORACLE
    • ORACLE. 1999. JAR file specification. http://docs.oracle.com/javase/1.4. 2/docs/guide/jar/jar.html.
    • (1999) JAR File Specification
  • 40
    • 84890370128 scopus 로고    scopus 로고
    • ORACLE
    • ORACLE. 2010. JVM tool interface, version 1.0. http://docs.oracle.com/ javase/1.5.0/docs/guide/jvmti/jvmti.html.
    • (2010) JVM Tool Interface, Version 1.0
  • 41
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • PROVOS, N
    • PROVOS, N. 2003. Improving host security with system call policies. In Proceedings of the 12th Usenix Security Symposium. 257-272.
    • (2003) Proceedings of the 12th Usenix Security Symposium , pp. 257-272
  • 42
    • 81455129267 scopus 로고    scopus 로고
    • PYTHON/C FFI
    • PYTHON/C FFI, 2009, Python/C api reference manual, http://docs.python. org/c-api/index.html
    • (2009) Python/C Api Reference Manual
  • 56
    • 33845435188 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for linux using mondriaan memory protection
    • DOI 10.1145/1095809.1095814
    • WITCHEL, E., RHEE, J., AND ASANOVIC, K. 2005. Mondrix: Memory isolation for linux using mondriaan memory protection. In Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'05). 31-44. (Pubitemid 44892203)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.5 , pp. 31-44
    • Witchel, E.1    Rhee, J.2    Asanovic, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.