[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

[PDF][PDF] A capability-based module system for authority control

D Melicher, Y Shi, A Potanin… - … European Conference on …, 2017 - drops.dagstuhl.de
The principle of least authority states that each component of the system should be given
authority to access only the information and resources that it needs for its operation. This …

BejaGNN: behavior-based Java malware detection via graph neural network

P Feng, L Yang, D Lu, N Xi, J Ma - The Journal of Supercomputing, 2023 - Springer
As a popular platform-independent language, Java is widely used in enterprise applications.
In the past few years, language vulnerabilities exploited by Java malware have become …

[HTML][HTML] A systematic analysis of the science of sandboxing

M Maass, A Sales, B Chung, J Sunshine - PeerJ Computer Science, 2016 - peerj.com
Sandboxes are increasingly important building materials for secure software systems. In
recognition of their potential to improve the security posture of many systems at various …

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager

PC Amusuo, KA Robinson, S Torres-Arias… - arXiv preprint arXiv …, 2023 - arxiv.org
Integrating third-party packages accelerates modern software engineering, but introduces
the risk of software supply chain vulnerabilities. Vulnerabilities in applications' …

Capabilities: Effects for free

A Craig, A Potanin, L Groves, J Aldrich - Formal Methods and Software …, 2018 - Springer
Object capabilities are increasingly used to reason informally about the properties of secure
systems. But can capabilities also aid in formal reasoning? To answer this question, we …

[PDF][PDF] A Theory and Tools for Applying Sandboxes Effectively.

M Maass - 2016 - cs.cmu.edu
It is more expensive and time consuming to build modern software without extensive supply
chains. Supply chains decrease these development risks, but typically at the cost of …

[PDF][PDF] Controlling Module Authority Using Programming Language Design.

D Melicher - 2020 - reports-archive.adm.cs.cmu.edu
The security of a software system relies on the principle of least privilege, which says that
each software component must have only the privilege necessary for its execution and …

A Systematic Hardening of Java's Information Hiding

P Holzinger, E Bodden - … of the 2021 International Symposium on …, 2021 - dl.acm.org
The Java runtime is installed on billions of devices worldwide, and over years it has been a
primary attack vector for online criminals. In this work, we address that many attack vectors …

QSandbox: The Agile Quantum Software Sandbox

I Exman - Quantum Software: Aspects of Theory and System …, 2024 - Springer
QSandbox is an agile software sandbox specifically designed for Quantum Software
research and development. QSandbox agility goes beyond the System Under Development …