2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.75
|View full text |Cite
|
Sign up to set email alerts
|

Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…First, if there is a malicious program having obtained the highest level, all data and method in the related applet will no longer be safe. Malicious programs applet can freely access the data information in the other application that it wants to get [10].…”
Section: Analysis Of Other Methodsmentioning
confidence: 99%
“…First, if there is a malicious program having obtained the highest level, all data and method in the related applet will no longer be safe. Malicious programs applet can freely access the data information in the other application that it wants to get [10].…”
Section: Analysis Of Other Methodsmentioning
confidence: 99%
“…Therefore, we often learn about VM protection from their breakers instead of their makers. For example, [20] is the 121 978-1-4577-0460-4/11/$26.00 ©2011 IEEE most complete documentation of Code Virtualizer internals available outside Oreans.…”
Section: A Virtual Machines For Copy Protectionmentioning
confidence: 99%
“…This API is usually used by performance profilers and debuggers [19], [20], [21], [22]. JVM TI is a two-way interface.…”
Section: Jni/jvm Timentioning
confidence: 99%