Active Bibliography

2 Flexible Code Safety for Win32 – Andrew R. Twyman - 1999
Separating Access Control Policy, – Enforcement And Functionality, Robert Grimm, Brian N. Bershad - 2001
37 Efficient, Transparent and Comprehensive Runtime Code Manipulation – Derek L. Bruening - 2004
28 Language-Based Security – Dexter Kozen - 1999
20 Providing policy-neutral and transparent access control in extensible systems – Robert Grimm , Brian N. Bershad - 1998
45 Janus: An Approach for Confinement of Untrusted Applications – David Wagner - 1999
5 SECURITY POLICY ENFORCEMENT BY AUTOMATED PROGRAM-REWRITING – Kevin W. Hamlen - 2006
8 Understanding and Improving the Performance of Modern Programming Languages – Amer Suleman Diwan - 1997
25 Mobile Code Security by Java Bytecode Instrumentation – Ajay Chander, John C. Mitchell, Insik Shin - 2001
142 IRM Enforcement of Java Stack Inspection – Ulfar Erlingsson, Fred B. Schneider - 2000
103 Automatic Program Transformation with JOIE – Geoff A. Cohen, Jeffrey S. Chase, David L. Kaminsky - 1998
40 A Secure PLAN – Michael Hicks, Angelos D. Keromytis - 1999
31 Whole-Program Optimization of Object-Oriented Languages – Jeffrey Adgate Dean - 1996
186 Extensible security architecture for Java – Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten - 1997
8 SELF: a transparent security extension for ELF binaries – Daniel C. Duvarney - 2003
Typed Intermediate Languages – Stephen Tse, Stephen Tse
70 Specifying Representations of Machine Instructions – Norman Ramsey, Mary F. Fern├índez - 1997
USENIX Association – Symposium Washington Usa, David Larochelle, David Evans - 1997
4 FUNCTIONALITY-BASED APPLICATION CONFINEMENT: Parameterised Hierarchical Application Restrictions – Z. Cliffe Schreuders, Christian Payne