2008
DOI: 10.1016/j.istr.2008.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Security-by-contract on the .NET platform

Abstract: a b s t r a c tOver the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mobile devices. Many people now already have a device that can connect to the Internet and run untrusted code, typically a cell-phone or PDA. Having such a large interconnected and powerful computing base presents some new security issues. In order to counter new threats, the traditional security architectures need to be overhauled to support a new and more flexible way of securely executing mobile … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…Zhang et al [49] incorporate trusted computing and SELinux into mobile phones. Security-by-contract [9] retrofits Microsoft's compact .NET platform by associating an application with a "contract" of declared functionality. If the application deviates from the contractual policy, the runtime environment interrupts execution.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [49] incorporate trusted computing and SELinux into mobile phones. Security-by-contract [9] retrofits Microsoft's compact .NET platform by associating an application with a "contract" of declared functionality. If the application deviates from the contractual policy, the runtime environment interrupts execution.…”
Section: Related Workmentioning
confidence: 99%
“…Kirin [27] and Saint [28] provide rule-based security mechanisms for Android that restrict application access to sensitive information. SxC [29] adds provable security contracts to Windows Mobile for the same purpose. Other systems [7], [14], [18], [30] leverage static analysis to discern information leaking in Android and iOS applications.…”
Section: Dynamic Tag System Performancementioning
confidence: 99%
“…The S×C paradigm was proposed for multi-application mobile devices (JavaME and .NET technologies) [30,31]. In the original S×C scheme an application arrives on the mobile platform equipped with a contract and signed by the developer.…”
Section: Related Workmentioning
confidence: 99%
“…The contract is matched by the device with the security policy before the execution [30]. In case of failure an inlined reference monitor is used [31]. This approach allows to run even potentially dangerous applications in a sandbox environment.…”
Section: Related Workmentioning
confidence: 99%