Understanding Java stack inspection

DS Wallach, EW Felten - … on Security and Privacy (Cat. No …, 1998 - ieeexplore.ieee.org
Stack inspection has been criticized for its implementation-… we will present a model of stack
inspection using a belief logic … implementing stack inspection which is applicable to Java and …

IRM enforcement of Java stack inspection

U Erlingsson, FB Schneider - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
… In order to understand the performance of stack inspection implementations, we must
know the frequency and cost of relevant security events in actual applications. We therefore …

Interfaces for stack inspection

F Besson, TG de Latour, T Jensen - Journal of Functional …, 2005 - cambridge.org
… security architecture of Java (Gong, 1997) as well as that of .NET (LaMacchia et al., 2002).
To get an intuitive understanding of stack inspection we sketch how it is used in Java. Assume …

Stack inspection: Theory and variants

C Fournet, AD Gordon - ACM SIGPLAN Notices, 2002 - dl.acm.org
… a better understanding of the limitations of stack inspection, … semantics to model stack
inspection in a Java-like class-based … semantics of the stack inspection mechanism in Java 2, but …

Stack inspection: Theory and variants

C Fournet, AD Gordon - ACM Transactions on Programming Languages …, 2003 - dl.acm.org
… To get a better understanding of the limitations of stack inspection, we now consider
alternative operational semantics that keep track of dependencies more systematically. …

Continuations from generalized stack inspection

G Pettyjohn, J Clements, J Marshall… - ACM SIGPLAN …, 2005 - dl.acm.org
… marks support a powerful form of stack inspection generalizing Java’s mechanism with the
… Equipped with a basic understanding of MzScheme’s continuation marks, we can now show …

Understanding and analyzing java reflection

Y Li, T Tan, J Xue - ACM Transactions on Software Engineering and …, 2019 - dl.acm.org
… It allows a software system to inspect and change the … a comprehensive understanding of
Java reflection through … a new static approach to resolving Java reflection effectively in practice. …

Secure calling contexts for stack inspection

F Besson, T de Grenier de Latour… - Proceedings of the 4th …, 2002 - dl.acm.org
… plays a fundamental role in the security architecture of Java [12] as well as in the CLR [15].
To get an intuitive understanding of stack inspection we sketch how it is used in Java. …

Selected tools for Java class and bytecode inspection in the educational environment

T Dobravec - Open Computer Science, 2021 - degruyter.com
understanding of the Java world, we … stack – before the execution of an instruction the stack
is used to store operands, after the execution it holds the value of the result. Besides the stack

Beyond stack inspection: A unified access-control and information-flow security model

M Pistoia, A Banerjee… - 2007 IEEE Symposium on …, 2007 - ieeexplore.ieee.org
… At each existing testR command (corresponding to calls to checkPermission in Java and
Demand in CLR), an ordinary stack inspection is performed. However, it is necessary for the …