1 resultado para Opéra. 1729, dossier Toussaint
em Boston University Digital Common
Filtro por publicador
- Aberystwyth University Repository - Reino Unido (2)
- Acceda, el repositorio institucional de la Universidad de Las Palmas de Gran Canaria. España (4)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (60)
- Aquatic Commons (9)
- Archimer: Archive de l'Institut francais de recherche pour l'exploitation de la mer (1)
- Archive of European Integration (23)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (10)
- Biblioteca Digital | Sistema Integrado de Documentación | UNCuyo - UNCUYO. UNIVERSIDAD NACIONAL DE CUYO. (16)
- Biblioteca Digital de la Universidad Católica Argentina (1)
- Biblioteca Valenciana Digital - Ministerio de Educación, Cultura y Deporte - Valencia - Espanha (1)
- Biodiversity Heritage Library, United States (1)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (23)
- Boston University Digital Common (1)
- Bucknell University Digital Commons - Pensilvania - USA (1)
- Cámara de Comercio de Bogotá, Colombia (14)
- Cambridge University Engineering Department Publications Database (2)
- CentAUR: Central Archive University of Reading - UK (2)
- Center for Jewish History Digital Collections (5)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (27)
- CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (1)
- CORA - Cork Open Research Archive - University College Cork - Ireland (2)
- Dalarna University College Electronic Archive (1)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digitale Sammlungen - Goethe-Universität Frankfurt am Main (42)
- Duke University (2)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (384)
- Greenwich Academic Literature Archive - UK (1)
- Harvard University (8)
- Indian Institute of Science - Bangalore - Índia (5)
- Infoteca EMBRAPA (5)
- Instituto de Engenharia Nuclear, Brazil - Carpe dIEN (2)
- Instituto Politécnico de Castelo Branco - Portugal (1)
- Instituto Politécnico do Porto, Portugal (3)
- Memoria Académica - FaHCE, UNLP - Argentina (86)
- Ministerio de Cultura, Spain (27)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (1)
- Portal de Revistas Científicas Complutenses - Espanha (8)
- Publishing Network for Geoscientific & Environmental Data (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (19)
- Queensland University of Technology - ePrints Archive (20)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositorio Institucional de la Universidad Nacional Agraria (2)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- Savoirs UdeS : plateforme de diffusion de la production intellectuelle de l’Université de Sherbrooke - Canada (5)
- The Scholarly Commons | School of Hotel Administration; Cornell University Research (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad de Alicante (3)
- Universidad del Rosario, Colombia (1)
- Universidade Complutense de Madrid (2)
- Université de Lausanne, Switzerland (2)
- Université de Montréal (1)
- Université de Montréal, Canada (22)
- University of Michigan (101)
- WestminsterResearch - UK (2)
Resumo:
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of the approach in the context of known security exploits is provided. This type of analysis represents a significant departure from standard malware analysis methods based on signatures or anomaly detection.