Sciweavers

1490 search results - page 31 / 298
» Monitoring Mobile Code
Sort
View
SEKE
2009
Springer
15 years 6 months ago
Extending AOP to Support Broad Runtime Monitoring Needs
Abstract—Runtime monitoring, where some part of a program’s behavior and/or data is observed during execution, is a very useful technique that software developers to use for un...
Amjad Nusayr, Jonathan Cook
JALC
2006
125views more  JALC 2006»
14 years 11 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
IEEEARES
2009
IEEE
15 years 6 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
MDM
2004
Springer
15 years 5 months ago
Mobile Agents: Ten Reasons For Failure
Mobile agents have often been advocated as the solution to the problem of designing and implementing distributed applications in a dynamic environment. Mobile agents provide a ver...
Giovanni Vigna
ESORICS
2007
Springer
15 years 6 months ago
Security of Multithreaded Programs by Compilation
Abstract. Information security is a pressing challenge for mobile code technologies. In order to claim end-to-end security of mobile code, it is necessary to establish that the cod...
Gilles Barthe, Tamara Rezk, Alejandro Russo, Andre...