/. Ljava and . Security, Policy ; setPolicy ( Ljava / security / Policy, pp.333-334

/. Ljava and . Security, Policy ; getInstance ( Ljava / lang / String ;*) Ljava / security / Policy, p.338

/. Ljava and . Security, Provider ; remove ( Ljava / lang / Object ;) Ljava / lang / Object, p.350

/. Ljava and . Security, Security ; getProperty ( Ljava / lang / String ;) Ljava / lang / String, p.354

/. Ljava and /. Security, i ns e r t P r o v i d e r A t ( Ljava / security / Provider ; I ) I, pp.358-359

/. Ljava and . Security, Signer ; getPrivateKey () Ljava / security / PrivateKey, p.371

/. Ljavax and /. Auth, Subject ; getSubject ( Ljava / security / A c c e s s C o n t r o l C o n t e x t ;) Ljavax / security, p.383

/. Ljava and . Security, P r i v il e g e d A c t i o n

/. Ljava and . Security, P r i v i l e g e d E x c e p t i o n A c t i o n ;) Ljava / lang / Object, p.392

/. Ljavax and . Subject, doAsPri vileged ( Ljavax / security / auth / Subject ; Ljava / security / P r i v i l e g e d A ct i o n ; Ljava / security / A c c e s s C o n t r o l C o n t e x t

/. Ljavax and . Logincontext, < init >( Ljava / lang / String ; Ljavax / security

/. Ljavax and . Logincontext, < init >( Ljava / lang / String ; Ljavax / security / auth / callback / Ca ll ba c kH an dl e r

/. Ljavax and /. Auth, login / Configuration ; s e t C o n f i g u r a t io n ( Ljavax / security, pp.415-416

/. Ljavax and /. Auth, login / Configuration ; getInstance ( Ljava / lang / String ;*) Ljavax / security

/. Ljavax and /. Auth, login / Configuration ; getInstance ( Ljava / lang / String

/. Ljavax and /. Auth, login / Configuration ; getInstance ( Ljava / lang / String

/. Ljava and /. Authenticator, r e q u e s t P a s s w o r d A u t h e n t i c a t i o n ( Ljava / net / InetAddress

/. Ljava and /. Url, < init >(*) V 441 } 442 443 # 444 # ===== java . net . S o c k e t P e r m i s s i on =====, pp.445-446

/. Ljava, Datagra mSocket ; send ( Ljava / net / Datagram Packet

/. Ljava, Datagra mSocket ; receive ( Ljava / net / Dat agramPa cket

/. Ljava, Datagra mSocket ; send ( Ljava / net / Datagram Packet

/. Ljava, Datagra mSocket ; send ( Ljava / net / Datagram Packet

/. Ljava, Datagra mSocket ; ge t Lo ca lA d dr es s () Ljava

/. Ljava, Datagra mSocket, < init >

/. Ljava, DriverManager ; setLogStream ( Ljava / io / PrintWriter ;) V 491 } 492 493 # 494 # ===== java . util . P r o p e r t y P e r m i s s i o n ===== 495, p.496

. Ljava, Introspector ; s e t B e a n I n f o S e a r c h P a t h

. Ljava, t y E d i t o r M a n a g e r ; s e t E d i t o r S e a r c h P a t h

/. Ljava and . Lang, System ; setProperties ( Ljava / util / Properties

/. Ljava and . Lang, System ; getProperty ( Ljava / lang / String

/. Ljava and . Lang, System ; getProperty ( Ljava / lang / String ; Ljava / lang / String ;) Ljava / lang / String, p.511

. Ljava, Introspector ; s e t B e a n I n f o S e a r c h P a t h

. Ljava, t y E d i t o r M a n a g e r ; s e t E d i t o r S e a r c h P a t h

/. Ljava and . Lang, System ; setProperties ( Ljava / util / Properties

/. Ljava and . Lang, System ; setProperty ( Ljava / lang / String ; Ljava / lang / String ;) Ljava / lang / String, p.525

/. Ljava, Locale ; setDefault ( Ljava / util / Lo ca l e$ Ca te g or

B. Annexe, . Implémentation-du-cas-d-'étude, and . Java, Nous proposons ici une implémentation du cas d'étude présenté dans, Les listings B.1

]. W. Bibliographie1, N. Rogers, S. Armstrong, D. Ride, E. Acheson et al., Report of the presidential commission on the space shuttle challenger accident, Tech. Rep, 1986.

P. Chambet, La gestion des correctifs de sécurité, 2005.

M. Fonda, Protection obligatoire des serveurs d'applications web : application aux processus métiers, 2014.

J. Briffaut, M. Peres, C. Toinard, J. Rouzaud-cornabas, B. Venelle et al., PIGA-OS : Retour sur le Système d'Exploitation Vainqueur du Défi Sécurité, RenPar'20 / SympA'14 / CFSE 8, 8ème Conférence Francaise en Systèmes d'Exploitation. Saint-Malo, France : RenPar'20 / SympA'14, 2011.

E. W. Dijkstra, Computing Science, ACM SIGAPP Applied Computing Review, pp.2-9, 1999.
DOI : 10.1145/335527.335528

R. Jeffries, Java and security : 17 years in (brief) review, " Solutionary, Tech. Rep., march 2013

S. Govindavajhala and A. W. Appel, Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.154, 2003.
DOI : 10.1109/SECPRI.2003.1199334

L. S. Of-delirium-research and . Group, Java and java virtual machine security vulnerabilities and their exploitation techniques Available : https, Proceedings of Black Hat Asia, 2002.

J. Wook, . Matt, and . Oh, Available : https://media Sécurité et langage java Avai- lable : http://www.ssi.gouv.fr/fr/anssi/publications/publicationsscientifiques/autres-publications/securite-et-langage-java .html [11] A. Gowdiak Security vulnerabilities in java se Available : http: //www.security-explorations.com/materials/se-2012-01-report.pdf [12] Sun Microsystems Inc, Secure Coding Guidelines for Java SE The Java Virtual Machine Specification Available, Proceedings of Black Hat USA 2012 Las Vegas Agence Nationale de la Sécurité des Systèmes d'Informa- tion (ANSSI), Tech. Rep., may 2010. [Online], 2011.

J. Gosling, B. Joy, G. Steele, G. Bracha, and A. Buckley, The Java Language Specification, Java SE 7 Edition Available : http://docs.oracle.com/javase/specs/jls/se7/jls7 Evaluation of android dalvik virtual machine, Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems, ser. JTRES '12, pp.115-124, 2011.

B. Venners, Inside the Java Virtual Machine, 1999.

H. M. and J. Gosling, The Java Language Environment : Contents. Sun Microsystems, may 1996

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, 1975.
DOI : 10.1109/PROC.1975.9939

R. Scheifler and L. Gong, Stack based access control using code and executor identifiers, p.540, 2002.

D. S. Wallach and E. W. Felten, Understanding Java stack inspection, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.52-63, 1998.
DOI : 10.1109/SECPRI.1998.674823

F. Microsoft, D. Long, R. C. Mohindra, D. F. Seacord, D. Sutherland et al., Microsoft Developer Network Available : http://msdn.microsoft.com/en-us/library/c5tk9z76(v=vs.110).aspx [25] The CERT Oracle secure coding standard for Java, ser. The SEI series in software engineering Available : https, Tech. Rep, vol.5, 2012.

M. Abadi and C. Fournet, Access control based on execution history, Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp.107-121, 2003.

M. Pistoia, Beyond stack inspection : A unified access-control and information-flow security model, " in In SP'07 : Security and Privacy, pp.149-163, 2007.

S. Zdancewic, A Type System for Robust Declassification, Electronic Notes in Theoretical Computer Science, vol.83, pp.263-277, 2013.
DOI : 10.1016/S1571-0661(03)50014-7

X. Leroy, Java bytecode verification : Algorithms and formalizations, Journal of Automated Reasoning, vol.30, issue.3/4, pp.235-2691025055424017, 2003.
DOI : 10.1023/A:1025055424017

URL : https://hal.archives-ouvertes.fr/hal-01499939

H. G. Rice, Classes of recursively enumerable sets and their decision problems, Transactions of the American Mathematical Society, vol.74, issue.2, pp.358-366, 1953.
DOI : 10.1090/S0002-9947-1953-0053041-6

S. Nair, P. Simpson, B. Crispo, and A. Tanenbaum, Available : http://www.open-std.org/jtc1/ sc22 Trishul : A policy enforcement architecture for java virtual machines, draft. [Online], 1999.

J. Clause, W. Li, and A. Orso, Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pp.196-206, 2007.
DOI : 10.1145/1273463.1273490

E. J. Schwartz, T. Avgerinos, and D. Brumley, All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask), 2010 IEEE Symposium on Security and Privacy, pp.317-331, 2010.
DOI : 10.1109/SP.2010.26

G. Hiet, V. V. Tong, L. Me, B. Morin-andriatsimandefitra, S. Geller et al., Policy&#45 ;based intrusion detection in web applications by monitoring java information flows Designing information flow policies for android's operating system, Communications (ICC), 2012 IEEE International Conference on, pp.265-279, 2009.

R. Andriatsimandefitra, V. Viet-triem, L. Tong, and . Mé, Diagnosing intrusions in Android operating system using system flow graph, Workshop Interdisciplinaire sur la Sécurité Globale, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00875211

M. Jaume, V. Viet-triem, L. Tong, and . Mé, Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, Proceedings of the 7th International Conference on Information Systems Security (ICISS), pp.72-86, 2011.
DOI : 10.1007/978-3-540-39650-5_17

URL : https://hal.archives-ouvertes.fr/hal-00647170

G. Hiet, L. Mé, B. Morin, and V. V. Tong, Monitoring both os and program level information flows to detect intrusions against network servers, Proceedings of IEEE Workshop on Monitoring, Attack Detection and Mitigation, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00268408

T. Letan, Proposition et implémentation d'une coopération entre deux moniteurs de flux d'information Master's thesis, INRIA-IRISA Rennes Bretagne Atlantique, équipe CIDRE, 2013.

V. Haldar, D. Chandra, and M. Franz, Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), 2005.
DOI : 10.1109/CSAC.2005.21

L. Cavallaro, P. Saxena, and R. Sekar, On the Limits of Information Flow Techniques for Malware Analysis and Containment, Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '08, pp.143-163, 2008.
DOI : 10.1007/978-3-540-70542-0_8

J. Andronick, B. Chetali, and C. Paulin-mohring, Formal Verification of Security Properties of Smart Card Embedded Source Code, Proceedings of the 2005 International Conference on Formal Methods, ser. FM'05, pp.302-317, 2005.
DOI : 10.1007/11526841_21

P. Li and S. Zdancewic, Arrows for secure information flow, Theoretical Computer Science, vol.411, issue.19, pp.1974-1994, 2010.
DOI : 10.1016/j.tcs.2010.01.025

V. Simonet and I. Rocquencourt, Flow caml in a nutshell, Proceedings of the first APPSEM-II workshop, pp.152-165, 2003.

A. C. Myers, S. Chong, N. Nystrom, L. Zheng, and S. Zdancewic, Jif : Java Information Flow

E. Legifrance, Code de la propriété intellectuelle : (partie législative)

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

A. Askarov and A. C. Myers, Attacker Control and Impact for Confidentiality and Integrity, Logical Methods in Computer Science, vol.7, issue.3, 2011.
DOI : 10.2168/LMCS-7(3:17)2011

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

E. D. Bell and J. L. Padula, Secure computer system : Unified exposition and multics interpretation, 1976.

D. E. Bell, Looking Back at the Bell-La Padula Model, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.337-35137, 2005.
DOI : 10.1109/CSAC.2005.37

K. J. Biba, Integrity considerations for secure computer systems, MITRE corporation Tech. Rep, 1977.

. Microsoft, Windows vista integrity mechanism technical reference, Microsoft Developer Network (MSDN), 2006.

B. Hicks, S. Rueda, T. Jaeger, and P. Mcdaniel, From trusted to secure : Building and executing applications that enforce system security Available : https, USENIX ANNUAL TECHNICAL CONFERENCE, 2007.

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar : practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, ser. PLDI '09, pp.63-74, 2009.

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000.
DOI : 10.1145/363516.363526

V. Simonet and I. Rocquencourt, Flow caml in a nutshell, Proceedings of the first APPSEM-II workshop, pp.152-165, 2003.

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard OS abstractions, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.321-334, 2007.
DOI : 10.1145/1323293.1294293

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004.
DOI : 10.1109/MICRO.2004.31

P. Loscocco and S. Smalley, Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track : 2001 USENIX Annual Technical Conference : USENIX Association, pp.29-42, 2001.

L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, A domain and type enforcement unix prototype, Proceedings of the Fifth USENIX UNIX Security Symposium, pp.127-140, 1996.

M. R. Azadmanesh and M. Sharifi, Towards a system-wide and transparent security mechanism using language-level information flow control, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.19-26, 2010.
DOI : 10.1145/1854099.1854107

S. Smalley, Middleware mac for seandroid Linux security submit Available : http://selinuxproject, 2012.

J. Briffaut, M. Peres, and C. Toinard, A dynamic end-to-end security for coordinating multiple protections within a Linux desktop, 2010 International Symposium on Collaborative Technologies and Systems, pp.509-515, 2010.
DOI : 10.1109/CTS.2010.5478471

URL : https://hal.archives-ouvertes.fr/hal-00483076

M. Fonda, S. Moinard, and C. Toinard, Advanced Protection of Workflow Sessions with SEWebSession, Business Process Management Workshops, ser. Lecture Notes in Business Information Processing, pp.713-718, 2012.
DOI : 10.1007/978-3-642-36285-9_71

URL : https://hal.archives-ouvertes.fr/hal-00809341

A. Kay, Prototypes vs classes Squeak mailling list Available : http://lists.squeakfoundation.org/pipermail/squeak- dev, 1998.

O. Dahl, The birth of object orientation : the simula languages, " in From Object-Orientation to Formal Methods, Essays in Memory of Ole, pp.15-25978, 2004.

O. M. Group, Infrastructure , Object Management Group, OMG Unified Modeling LanguageTM (OMG UML), 2011.

?. and O. Languagetm, Superstructure, Object Management Group, 2011.

R. Colvin, An operational semantics for object-oriented concepts based on the class hierarchy, Formal Aspects of Computing, vol.67, issue.1???2, pp.491-535, 2014.
DOI : 10.1007/s00165-012-0259-y

A. Hense, Denotational semantics of an object-oriented programming language with explicit wrappers, Formal Aspects of Computing, vol.322, issue.3, pp.181-207, 1993.
DOI : 10.1007/BF01211554

M. Abadi and L. Cardelli, A Theory of Objects, 1996.
DOI : 10.1007/978-1-4419-8598-9

A. M. Turing, Computers & thought, ch. Computing Machinery and Intelligence, pp.11-35, 1995.

G. B. Lindholm, F. Yellin, and A. Buckley, The Java Virtual Machine Specification, Java SE 8 Edition, 2014.

J. Rouzaud-cornabas, Formalisation de propriétés de sécurité pour la protection des systèmes d'exploitation, 2010.

J. Briffaut, Formalisation et garantie de propriétés de sécurité système : application á la détection d'intrusions, 2007.

A. Bousquet, J. Briffaut, L. Clévy, C. Toinard, and B. Venelle, Mandatory Access Control for the Android Dalvik Virtual Machine, 2013 -USENIX Federated Conferences, ESOS : Workshop on Embedded Self-Organizing Systems, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00840732

B. Venelle, J. Briffaut, L. Clévy, and C. Toinard, Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine, 16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013), 2013.
DOI : 10.1109/ISORC.2013.6913208

URL : https://hal.archives-ouvertes.fr/hal-00840729

E. Snowden, Edward snowden in his own words, PRISM Whistleblower, 2014.

S. Formations, Contrôle d'accès en java

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

M. J. Fischer, N. A. Lynch, and M. S. Paterson, Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985.
DOI : 10.1145/3149.214121

G. Hunt and D. Brubacher, Detours : Binary interception of win32 functions, Proceedings of the 3rd Conference on USENIX 218 BIBLIOGRAPHIE Windows NT Symposium : USENIX Association, pp.14-14, 1999.

. Michael-'mihi-'schierl, Cve-2012-1723 openjdk : insufficient field accessibility checks

S. Koivu, Cve-2008-5353 : Calendar bug, " (Slightly) Random Broken Thoughts, 2008.

E. Guillardoy, Java 0day analysis (cve-2012-4681) Independent study, Tech. Rep, 2012.

L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, p.66, 1995.
DOI : 10.1109/SECPRI.1995.398923

P. Seibel, Available : http: //books.google.fr/books?id=nneBa6-mWfgC [95] t. f. e. Wikipedia Comparison of java virtual machines, " Wikipedia's article, may 2015, Reflections on the Craft of Programming, ser. Apresspod Series. Apress, 2009.

M. Sun and . Inc, The Java Platform Debugger Architecture, Oracle America Inc, 2004.

C. Prasad, R. Ramchandani, G. Rao, and K. Levesque, Creating a Debugging and Profiling Agent with JVMTI, Sun Microsystems Inc, 2004.

R. Field, Implementation in Hotspot, 2007.

S. Chiba and M. Nishizawa, An Easy-to-Use Toolkit for Efficient Java Bytecode Translators, Proceedings of the 2Nd International Conference on Generative Programming and Component Engineering, ser. GPCE '03, pp.364-376, 2003.
DOI : 10.1007/978-3-540-39815-8_22

T. Queste, An introduction to Java Agent and bytecode manipulation, 2014.

M. Khojaye and G. Setter, To Use or Not to Use, october 2010 Available : http://java.dzone.com/articles/getter-setter-use-or- not-use-0

F. Lugou, Instrumentation de machine virtuelle Java orientée contrôle d'accès obligatoire, 2014.

R. Spencer, S. Smalley, P. Loscocco, P. L. Hibler, J. Lepreau et al., The flask security architecture : System support for diverse security policies, Proceedings of The Eighth USENIX Security Symposium, pp.123-139, 1998.

B. Stroustrup, The C++ Programming Language, 2000.

C. Toinard, Towards an autonomous and distributed security management of federated clouds, Proceedings of the 2015 Cloud Security Workshop (SEC2 -Lille). INRIA, 2015.