Entry Sun:2013:BJW from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Sun:2013:BJW,
author = "Mengtao Sun and Gang Tan and Joseph Siefers and Bin
Zeng and Greg Morrisett",
title = "Bringing {Java}'s wild native world under control",
journal = j-TISSEC,
volume = "16",
number = "3",
pages = "9:1--9:??",
month = nov,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2535505",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Dec 9 11:22:22 MST 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/tissec.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "For performance and for incorporating legacy
libraries, many Java applications contain native-code
components written in unsafe languages such as C and
C++. Native-code components interoperate with Java
components through the Java Native Interface (JNI). As
native code is not regulated by Java's security model,
it poses serious security threats to the managed Java
world. We introduce a security framework that extends
Java's security model and brings native code under
control. Leveraging software-based fault isolation, the
framework puts native code in a separate sandbox and
allows the interaction between the native world and the
Java world only through a carefully designed pathway.
Two different implementations were built. In one
implementation, the security framework is integrated
into a Java Virtual Machine (JVM). In the second
implementation, the framework is built outside of the
JVM and takes advantage of JVM-independent interfaces.
The second implementation provides JVM portability, at
the expense of some performance degradation. Evaluation
of our framework demonstrates that it incurs modest
runtime overhead while significantly enhancing the
security of Java applications.",
acknowledgement = ack-nhfb,
articleno = "9",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- advantage,
1(1)93,
9(4)391,
15(1)4,
17(2)8,
17(4)14
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- based, software-,
17(2)6
- bring,
17(4)16
- bringing,
14(3)23,
16(3)11
- built,
12(2)11,
13(4)30,
18(1)1
- C,
15(1)2
- carefully,
2(4)416,
11(2)1,
12(3)17
- code,
5(3)238,
6(2)258,
11(4)23,
12(2)10,
12(2)11,
12(3)14,
12(3)19,
13(1)10,
13(2)17,
13(3)21,
15(1)2,
15(1)3,
15(2)10,
16(1)1,
16(2)6,
16(2)7,
18(4)12
- component,
2(1)105,
9(4)421,
11(3)13,
13(3)24,
13(3)28,
13(4)32,
15(3)13,
16(2)5,
18(2)8
- contain,
2(1)3,
2(2)177,
13(3)28,
15(2)7
- degradation,
13(4)34,
16(2)8
- demonstrate,
2(3)295,
10(1)4,
10(4)1,
10(4)4,
10(4)6,
11(1)3,
11(3)16,
11(4)22,
12(1)4,
12(3)19,
13(1)10,
13(4)30,
13(4)31,
13(4)38,
14(3)27,
15(1)2,
15(1)4,
15(2)7,
15(3)12,
15(3)13,
15(4)16,
16(3)10,
17(2)8,
17(3)10,
17(3)12,
17(4)16,
18(2)8,
18(4)12,
18(4)14
- designed,
2(4)416,
10(3)10,
10(3)11,
10(3)12,
11(1)2,
11(3)12,
12(4)21,
12(4)22,
13(3)25,
13(4)38,
16(2)5,
16(2)8,
16(3)10,
16(4)14,
17(4)13,
18(1)3
- different,
1(1)26,
1(1)93,
2(1)105,
2(2)138,
2(3)269,
10(1)2,
10(1)4,
10(4)4,
12(1)3,
12(3)14,
13(1)10,
13(3)27,
13(3)28,
14(1)4,
14(4)28,
15(1)2,
15(2)7,
15(2)10,
16(1)3,
16(2)7,
16(4)15,
17(2)7,
17(4)14,
18(1)1,
18(3)11
- enhancing,
13(3)20
- evaluation,
2(3)295,
3(4)262,
10(1)3,
11(1)3,
11(4)20,
11(4)22,
12(2)8,
12(2)11,
12(4)20,
13(2)14,
13(3)24,
13(3)25,
16(1)1,
16(1)2,
16(4)13,
16(4)17,
17(4)14,
18(1)1
- expense,
12(2)11,
12(3)18
- extend,
2(4)354,
2(4)390,
9(4)461,
10(1)2,
11(4)20,
12(1)5,
13(3)24,
14(1)8,
14(3)26,
15(1)4,
16(1)4,
16(2)5,
16(3)10,
17(2)5,
17(2)7,
17(4)15
- fault,
10(4)6,
11(3)13
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- incurs,
2(3)269
- integrated,
7(3)392,
11(1)2,
18(1)2
- interaction,
2(4)390,
10(3)12,
10(4)6,
12(2)8,
12(4)21,
14(1)6
- introduce,
1(1)66,
1(1)93,
2(3)230,
2(4)390,
9(2)162,
10(1)2,
10(1)3,
10(4)2,
11(2)5,
11(3)12,
11(4)17,
12(1)1,
12(1)3,
12(1)5,
12(2)13,
12(3)14,
12(3)15,
12(4)20,
13(3)24,
13(3)27,
13(4)32,
14(1)3,
14(1)12,
15(1)2,
16(2)7,
16(3)12,
16(4)17,
17(2)7,
17(3)9
- isolation,
12(3)14
- language,
2(1)65,
9(4)391,
9(4)421,
10(1)3,
10(2)8,
11(1)2,
11(1)4,
11(4)21,
12(1)1,
12(2)12,
13(3)20,
13(3)24,
13(3)26,
13(3)28,
14(1)9,
15(1)2,
15(2)8,
16(1)3,
16(4)17,
17(1)2,
17(1)3
- legacy,
11(1)2
- leveraging,
11(1)3,
16(4)17
- library,
2(4)354,
10(2)8,
12(2)10,
14(4)31,
15(1)2,
16(2)5,
18(1)4
- machine,
2(2)159,
2(2)177,
2(3)230,
2(3)295,
12(2)12,
14(1)6,
14(1)10,
14(2)18,
14(2)21,
15(2)9,
15(3)12,
16(2)7,
16(4)13,
16(4)14,
17(2)8,
18(2)6,
18(3)11
- managed,
10(4)2,
12(1)1
- many,
1(1)93,
2(1)65,
2(2)159,
2(3)332,
10(1)4,
10(4)1,
11(3)13,
11(4)22,
11(4)23,
12(1)2,
12(3)17,
12(3)18,
13(3)20,
13(3)22,
13(4)38,
13(4)39,
15(1)4,
15(2)6,
15(2)7,
16(2)5,
16(4)17,
17(1)4,
17(3)12,
18(1)1,
18(4)13
- modest,
2(3)332,
13(3)25,
13(4)34,
15(2)6,
16(3)11
- native,
16(1)1,
16(2)7
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- one,
1(1)26,
1(1)93,
2(1)3,
2(1)65,
2(3)295,
9(4)461,
10(1)2,
10(2)5,
10(2)8,
10(3)12,
10(4)3,
11(2)6,
11(3)14,
12(1)1,
12(1)5,
12(2)13,
12(3)14,
13(3)21,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)3,
14(1)5,
14(4)30,
14(4)32,
15(2)10,
15(3)11,
15(4)16,
15(4)18,
16(1)3,
16(1)4,
16(4)14,
17(2)8,
17(4)13,
18(1)1,
18(3)11,
18(4)13
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- outside,
12(3)14
- overhead,
2(3)269,
11(2)5,
11(4)18,
11(4)23,
12(2)8,
12(3)14,
13(3)25,
14(1)5,
15(2)6,
15(2)9,
16(1)1,
16(2)6,
16(2)7,
16(3)11,
17(3)10,
17(4)15,
18(3)11,
18(4)12
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)6,
16(2)8,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- pose,
15(2)7,
18(4)14
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- put,
10(4)4,
11(4)19,
13(4)37,
16(4)17,
18(1)1,
18(3)10
- runtime,
12(2)10,
13(3)25,
15(2)10,
16(1)4,
16(2)5,
17(3)11
- second,
9(2)181,
9(4)461,
11(2)3,
11(2)6,
11(4)22,
12(1)3,
12(1)5,
12(2)11,
13(4)31,
13(4)37,
16(3)10,
16(3)12,
17(3)10,
18(3)9
- serious,
18(4)12
- significantly,
1(1)93,
9(2)181,
9(4)461,
11(2)3,
12(3)17,
13(4)29,
14(1)7,
15(1)4,
15(2)9,
15(2)10,
15(3)11,
17(1)1,
18(1)1
- software-based,
17(2)6
- take,
2(4)416,
10(4)1,
12(3)17,
12(3)19,
12(4)22,
13(3)20,
16(2)5,
16(3)10,
16(4)15,
17(3)10,
18(1)4,
18(2)5,
18(4)12
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- unsafe,
1(1)26
- virtual,
4(2)103,
11(1)3,
11(1)4,
13(4)38,
14(3)27,
14(4)30,
16(2)7,
17(2)8,
17(4)13,
18(2)6
- were,
2(1)34,
2(1)105,
10(1)4,
12(3)14,
13(3)25,
13(4)38,
15(3)12,
16(2)8,
16(3)10,
18(3)9
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7
- wild,
17(1)1
- world,
14(1)4,
14(3)24,
16(3)10,
17(4)16
- written,
18(2)7