[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
[PDF][PDF] A capability-based module system for authority control
D Melicher, Y Shi, A Potanin… - … European Conference on …, 2017 - drops.dagstuhl.de
The principle of least authority states that each component of the system should be given
authority to access only the information and resources that it needs for its operation. This …
authority to access only the information and resources that it needs for its operation. This …
BejaGNN: behavior-based Java malware detection via graph neural network
As a popular platform-independent language, Java is widely used in enterprise applications.
In the past few years, language vulnerabilities exploited by Java malware have become …
In the past few years, language vulnerabilities exploited by Java malware have become …
[HTML][HTML] A systematic analysis of the science of sandboxing
Sandboxes are increasingly important building materials for secure software systems. In
recognition of their potential to improve the security posture of many systems at various …
recognition of their potential to improve the security posture of many systems at various …
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager
PC Amusuo, KA Robinson, S Torres-Arias… - arXiv preprint arXiv …, 2023 - arxiv.org
Integrating third-party packages accelerates modern software engineering, but introduces
the risk of software supply chain vulnerabilities. Vulnerabilities in applications' …
the risk of software supply chain vulnerabilities. Vulnerabilities in applications' …
Capabilities: Effects for free
Object capabilities are increasingly used to reason informally about the properties of secure
systems. But can capabilities also aid in formal reasoning? To answer this question, we …
systems. But can capabilities also aid in formal reasoning? To answer this question, we …
[PDF][PDF] A Theory and Tools for Applying Sandboxes Effectively.
M Maass - 2016 - cs.cmu.edu
It is more expensive and time consuming to build modern software without extensive supply
chains. Supply chains decrease these development risks, but typically at the cost of …
chains. Supply chains decrease these development risks, but typically at the cost of …
[PDF][PDF] Controlling Module Authority Using Programming Language Design.
D Melicher - 2020 - reports-archive.adm.cs.cmu.edu
The security of a software system relies on the principle of least privilege, which says that
each software component must have only the privilege necessary for its execution and …
each software component must have only the privilege necessary for its execution and …
A Systematic Hardening of Java's Information Hiding
P Holzinger, E Bodden - … of the 2021 International Symposium on …, 2021 - dl.acm.org
The Java runtime is installed on billions of devices worldwide, and over years it has been a
primary attack vector for online criminals. In this work, we address that many attack vectors …
primary attack vector for online criminals. In this work, we address that many attack vectors …
QSandbox: The Agile Quantum Software Sandbox
I Exman - Quantum Software: Aspects of Theory and System …, 2024 - Springer
QSandbox is an agile software sandbox specifically designed for Quantum Software
research and development. QSandbox agility goes beyond the System Under Development …
research and development. QSandbox agility goes beyond the System Under Development …