Policy ; setPolicy ( Ljava / security / Policy, pp.333-334 ,
Policy ; getInstance ( Ljava / lang / String ;*) Ljava / security / Policy, p.338 ,
Provider ; remove ( Ljava / lang / Object ;) Ljava / lang / Object, p.350 ,
Security ; getProperty ( Ljava / lang / String ;) Ljava / lang / String, p.354 ,
i ns e r t P r o v i d e r A t ( Ljava / security / Provider ; I ) I, pp.358-359 ,
Signer ; getPrivateKey () Ljava / security / PrivateKey, p.371 ,
Subject ; getSubject ( Ljava / security / A c c e s s C o n t r o l C o n t e x t ;) Ljavax / security, p.383 ,
P r i v il e g e d A c t i o n ,
P r i v i l e g e d E x c e p t i o n A c t i o n ;) Ljava / lang / Object, p.392 ,
doAsPri vileged ( Ljavax / security / auth / Subject ; Ljava / security / P r i v i l e g e d A ct i o n ; Ljava / security / A c c e s s C o n t r o l C o n t e x t ,
< init >( Ljava / lang / String ; Ljavax / security ,
< init >( Ljava / lang / String ; Ljavax / security / auth / callback / Ca ll ba c kH an dl e r ,
login / Configuration ; s e t C o n f i g u r a t io n ( Ljavax / security, pp.415-416 ,
login / Configuration ; getInstance ( Ljava / lang / String ;*) Ljavax / security ,
login / Configuration ; getInstance ( Ljava / lang / String ,
login / Configuration ; getInstance ( Ljava / lang / String ,
r e q u e s t P a s s w o r d A u t h e n t i c a t i o n ( Ljava / net / InetAddress ,
< init >(*) V 441 } 442 443 # 444 # ===== java . net . S o c k e t P e r m i s s i on =====, pp.445-446 ,
Datagra mSocket ; send ( Ljava / net / Datagram Packet ,
Datagra mSocket ; receive ( Ljava / net / Dat agramPa cket ,
Datagra mSocket ; send ( Ljava / net / Datagram Packet ,
Datagra mSocket ; send ( Ljava / net / Datagram Packet ,
Datagra mSocket ; ge t Lo ca lA d dr es s () Ljava ,
Datagra mSocket, < init > ,
DriverManager ; setLogStream ( Ljava / io / PrintWriter ;) V 491 } 492 493 # 494 # ===== java . util . P r o p e r t y P e r m i s s i o n ===== 495, p.496 ,
Introspector ; s e t B e a n I n f o S e a r c h P a t h ,
t y E d i t o r M a n a g e r ; s e t E d i t o r S e a r c h P a t h ,
System ; setProperties ( Ljava / util / Properties ,
System ; getProperty ( Ljava / lang / String ,
System ; getProperty ( Ljava / lang / String ; Ljava / lang / String ;) Ljava / lang / String, p.511 ,
Introspector ; s e t B e a n I n f o S e a r c h P a t h ,
t y E d i t o r M a n a g e r ; s e t E d i t o r S e a r c h P a t h ,
System ; setProperties ( Ljava / util / Properties ,
System ; setProperty ( Ljava / lang / String ; Ljava / lang / String ;) Ljava / lang / String, p.525 ,
Locale ; setDefault ( Ljava / util / Lo ca l e$ Ca te g or ,
Nous proposons ici une implémentation du cas d'étude présenté dans, Les listings B.1 ,
Report of the presidential commission on the space shuttle challenger accident, Tech. Rep, 1986. ,
La gestion des correctifs de sécurité, 2005. ,
Protection obligatoire des serveurs d'applications web : application aux processus métiers, 2014. ,
PIGA-OS : Retour sur le Système d'Exploitation Vainqueur du Défi Sécurité, RenPar'20 / SympA'14 / CFSE 8, 8ème Conférence Francaise en Systèmes d'Exploitation. Saint-Malo, France : RenPar'20 / SympA'14, 2011. ,
Computing Science, ACM SIGAPP Applied Computing Review, pp.2-9, 1999. ,
DOI : 10.1145/335527.335528
Java and security : 17 years in (brief) review, " Solutionary, Tech. Rep., march 2013 ,
Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.154, 2003. ,
DOI : 10.1109/SECPRI.2003.1199334
Java and java virtual machine security vulnerabilities and their exploitation techniques Available : https, Proceedings of Black Hat Asia, 2002. ,
Available : https://media Sécurité et langage java Avai- lable : http://www.ssi.gouv.fr/fr/anssi/publications/publicationsscientifiques/autres-publications/securite-et-langage-java .html [11] A. Gowdiak Security vulnerabilities in java se Available : http: //www.security-explorations.com/materials/se-2012-01-report.pdf [12] Sun Microsystems Inc, Secure Coding Guidelines for Java SE The Java Virtual Machine Specification Available, Proceedings of Black Hat USA 2012 Las Vegas Agence Nationale de la Sécurité des Systèmes d'Informa- tion (ANSSI), Tech. Rep., may 2010. [Online], 2011. ,
The Java Language Specification, Java SE 7 Edition Available : http://docs.oracle.com/javase/specs/jls/se7/jls7 Evaluation of android dalvik virtual machine, Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems, ser. JTRES '12, pp.115-124, 2011. ,
Inside the Java Virtual Machine, 1999. ,
The Java Language Environment : Contents. Sun Microsystems, may 1996 ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, 1975. ,
DOI : 10.1109/PROC.1975.9939
Stack based access control using code and executor identifiers, p.540, 2002. ,
Understanding Java stack inspection, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.52-63, 1998. ,
DOI : 10.1109/SECPRI.1998.674823
Microsoft Developer Network Available : http://msdn.microsoft.com/en-us/library/c5tk9z76(v=vs.110).aspx [25] The CERT Oracle secure coding standard for Java, ser. The SEI series in software engineering Available : https, Tech. Rep, vol.5, 2012. ,
Access control based on execution history, Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp.107-121, 2003. ,
Beyond stack inspection : A unified access-control and information-flow security model, " in In SP'07 : Security and Privacy, pp.149-163, 2007. ,
A Type System for Robust Declassification, Electronic Notes in Theoretical Computer Science, vol.83, pp.263-277, 2013. ,
DOI : 10.1016/S1571-0661(03)50014-7
Java bytecode verification : Algorithms and formalizations, Journal of Automated Reasoning, vol.30, issue.3/4, pp.235-2691025055424017, 2003. ,
DOI : 10.1023/A:1025055424017
URL : https://hal.archives-ouvertes.fr/hal-01499939
Classes of recursively enumerable sets and their decision problems, Transactions of the American Mathematical Society, vol.74, issue.2, pp.358-366, 1953. ,
DOI : 10.1090/S0002-9947-1953-0053041-6
Available : http://www.open-std.org/jtc1/ sc22 Trishul : A policy enforcement architecture for java virtual machines, draft. [Online], 1999. ,
Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pp.196-206, 2007. ,
DOI : 10.1145/1273463.1273490
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask), 2010 IEEE Symposium on Security and Privacy, pp.317-331, 2010. ,
DOI : 10.1109/SP.2010.26
Policy- ;based intrusion detection in web applications by monitoring java information flows Designing information flow policies for android's operating system, Communications (ICC), 2012 IEEE International Conference on, pp.265-279, 2009. ,
Diagnosing intrusions in Android operating system using system flow graph, Workshop Interdisciplinaire sur la Sécurité Globale, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00875211
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, Proceedings of the 7th International Conference on Information Systems Security (ICISS), pp.72-86, 2011. ,
DOI : 10.1007/978-3-540-39650-5_17
URL : https://hal.archives-ouvertes.fr/hal-00647170
Monitoring both os and program level information flows to detect intrusions against network servers, Proceedings of IEEE Workshop on Monitoring, Attack Detection and Mitigation, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00268408
Proposition et implémentation d'une coopération entre deux moniteurs de flux d'information Master's thesis, INRIA-IRISA Rennes Bretagne Atlantique, équipe CIDRE, 2013. ,
Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), 2005. ,
DOI : 10.1109/CSAC.2005.21
On the Limits of Information Flow Techniques for Malware Analysis and Containment, Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '08, pp.143-163, 2008. ,
DOI : 10.1007/978-3-540-70542-0_8
Formal Verification of Security Properties of Smart Card Embedded Source Code, Proceedings of the 2005 International Conference on Formal Methods, ser. FM'05, pp.302-317, 2005. ,
DOI : 10.1007/11526841_21
Arrows for secure information flow, Theoretical Computer Science, vol.411, issue.19, pp.1974-1994, 2010. ,
DOI : 10.1016/j.tcs.2010.01.025
Flow caml in a nutshell, Proceedings of the first APPSEM-II workshop, pp.152-165, 2003. ,
Jif : Java Information Flow ,
Code de la propriété intellectuelle : (partie législative) ,
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
Attacker Control and Impact for Confidentiality and Integrity, Logical Methods in Computer Science, vol.7, issue.3, 2011. ,
DOI : 10.2168/LMCS-7(3:17)2011
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Secure computer system : Unified exposition and multics interpretation, 1976. ,
Looking Back at the Bell-La Padula Model, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.337-35137, 2005. ,
DOI : 10.1109/CSAC.2005.37
Integrity considerations for secure computer systems, MITRE corporation Tech. Rep, 1977. ,
Windows vista integrity mechanism technical reference, Microsoft Developer Network (MSDN), 2006. ,
From trusted to secure : Building and executing applications that enforce system security Available : https, USENIX ANNUAL TECHNICAL CONFERENCE, 2007. ,
Laminar : practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, ser. PLDI '09, pp.63-74, 2009. ,
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000. ,
DOI : 10.1145/363516.363526
Flow caml in a nutshell, Proceedings of the first APPSEM-II workshop, pp.152-165, 2003. ,
Information flow control for standard OS abstractions, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.321-334, 2007. ,
DOI : 10.1145/1323293.1294293
RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004. ,
DOI : 10.1109/MICRO.2004.31
Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track : 2001 USENIX Annual Technical Conference : USENIX Association, pp.29-42, 2001. ,
A domain and type enforcement unix prototype, Proceedings of the Fifth USENIX UNIX Security Symposium, pp.127-140, 1996. ,
Towards a system-wide and transparent security mechanism using language-level information flow control, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.19-26, 2010. ,
DOI : 10.1145/1854099.1854107
Middleware mac for seandroid Linux security submit Available : http://selinuxproject, 2012. ,
A dynamic end-to-end security for coordinating multiple protections within a Linux desktop, 2010 International Symposium on Collaborative Technologies and Systems, pp.509-515, 2010. ,
DOI : 10.1109/CTS.2010.5478471
URL : https://hal.archives-ouvertes.fr/hal-00483076
Advanced Protection of Workflow Sessions with SEWebSession, Business Process Management Workshops, ser. Lecture Notes in Business Information Processing, pp.713-718, 2012. ,
DOI : 10.1007/978-3-642-36285-9_71
URL : https://hal.archives-ouvertes.fr/hal-00809341
Prototypes vs classes Squeak mailling list Available : http://lists.squeakfoundation.org/pipermail/squeak- dev, 1998. ,
The birth of object orientation : the simula languages, " in From Object-Orientation to Formal Methods, Essays in Memory of Ole, pp.15-25978, 2004. ,
Infrastructure , Object Management Group, OMG Unified Modeling LanguageTM (OMG UML), 2011. ,
Superstructure, Object Management Group, 2011. ,
An operational semantics for object-oriented concepts based on the class hierarchy, Formal Aspects of Computing, vol.67, issue.1???2, pp.491-535, 2014. ,
DOI : 10.1007/s00165-012-0259-y
Denotational semantics of an object-oriented programming language with explicit wrappers, Formal Aspects of Computing, vol.322, issue.3, pp.181-207, 1993. ,
DOI : 10.1007/BF01211554
A Theory of Objects, 1996. ,
DOI : 10.1007/978-1-4419-8598-9
Computers & thought, ch. Computing Machinery and Intelligence, pp.11-35, 1995. ,
The Java Virtual Machine Specification, Java SE 8 Edition, 2014. ,
Formalisation de propriétés de sécurité pour la protection des systèmes d'exploitation, 2010. ,
Formalisation et garantie de propriétés de sécurité système : application á la détection d'intrusions, 2007. ,
Mandatory Access Control for the Android Dalvik Virtual Machine, 2013 -USENIX Federated Conferences, ESOS : Workshop on Embedded Self-Organizing Systems, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00840732
Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine, 16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013), 2013. ,
DOI : 10.1109/ISORC.2013.6913208
URL : https://hal.archives-ouvertes.fr/hal-00840729
Edward snowden in his own words, PRISM Whistleblower, 2014. ,
Contrôle d'accès en java ,
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985. ,
DOI : 10.1145/3149.214121
Detours : Binary interception of win32 functions, Proceedings of the 3rd Conference on USENIX 218 BIBLIOGRAPHIE Windows NT Symposium : USENIX Association, pp.14-14, 1999. ,
Cve-2012-1723 openjdk : insufficient field accessibility checks ,
Cve-2008-5353 : Calendar bug, " (Slightly) Random Broken Thoughts, 2008. ,
Java 0day analysis (cve-2012-4681) Independent study, Tech. Rep, 2012. ,
Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, p.66, 1995. ,
DOI : 10.1109/SECPRI.1995.398923
Available : http: //books.google.fr/books?id=nneBa6-mWfgC [95] t. f. e. Wikipedia Comparison of java virtual machines, " Wikipedia's article, may 2015, Reflections on the Craft of Programming, ser. Apresspod Series. Apress, 2009. ,
The Java Platform Debugger Architecture, Oracle America Inc, 2004. ,
Creating a Debugging and Profiling Agent with JVMTI, Sun Microsystems Inc, 2004. ,
Implementation in Hotspot, 2007. ,
An Easy-to-Use Toolkit for Efficient Java Bytecode Translators, Proceedings of the 2Nd International Conference on Generative Programming and Component Engineering, ser. GPCE '03, pp.364-376, 2003. ,
DOI : 10.1007/978-3-540-39815-8_22
An introduction to Java Agent and bytecode manipulation, 2014. ,
To Use or Not to Use, october 2010 Available : http://java.dzone.com/articles/getter-setter-use-or- not-use-0 ,
Instrumentation de machine virtuelle Java orientée contrôle d'accès obligatoire, 2014. ,
The flask security architecture : System support for diverse security policies, Proceedings of The Eighth USENIX Security Symposium, pp.123-139, 1998. ,
The C++ Programming Language, 2000. ,
Towards an autonomous and distributed security management of federated clouds, Proceedings of the 2015 Cloud Security Workshop (SEC2 -Lille). INRIA, 2015. ,