Author image not provided
 Raphaël Khoury

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article2.75
Citation Count22
Publication count8
Publication years2009-2015
Available for download1
Average downloads per article526.00
Downloads (cumulative)526
Downloads (12 Months)32
Downloads (6 Weeks)2
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1
November 2015 International Journal of Information and Computer Security: Volume 7 Issue 2/3/4, November 2015
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Runtime monitoring is a widely used approach for the enforcement of security policies. It allows the safe execution of untrusted code by observing the execution and reacting if needed to prevent a violation of a user-defined security policy. Previous studies have determined that the set of security properties enforceable by ...

2 published by ACM
July 2012 ACM Transactions on Information and System Security (TISSEC): Volume 15 Issue 2, July 2012
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 32,   Downloads (Overall): 526

Full text available: PDFPDF
Runtime monitoring is an increasingly popular method to ensure the safe execution of untrusted codes. Monitors observe and transform the execution of these codes, responding when needed to correct or prevent a violation of a user-defined security policy. Prior research has shown that the set of properties monitors can enforce ...
Keywords: Monitoring, dynamic analysis, program transformation, runtime monitors, security policies enforcement

3
October 2011 NordSec'11: Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

A previous study showed how a monitor can be inlined into a potentially untrusted program, producing an instrumented version of this program which provably respects the desired security policy. That study extended previous approaches to the same problem in that it allowed non-safety properties to be monitored, and did not ...
Keywords: security properties, runtime monitors, security policies, omega-automata

4
June 2011 Computers and Security: Volume 30 Issue 4, June, 2011
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 3

Runtime monitors are a widely used approach to enforcing security policies. Truncation monitors are based on the idea of truncating an execution before a violation occurs. Thus, the range of security policies they can enforce is limited to safety properties. The use of an a priori static analysis of the ...
Keywords: Software safety, Computer security, Dynamic analysis, Monitoring

5
September 2010 FAST'10: Proceedings of the 7th International conference on Formal aspects of security and trust
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

Monitoring is a powerful security policy enforcement paradigm that allows the execution of a potentially malicious software by observing and transforming it, thus ensuring its compliance with a user-defined security policy. Yet some restrictions must be imposed on the monitor's ability to transform sequences for the enforcement to be meaningful. ...
Keywords: monitors, program transformation, security policies enforcement

6
September 2010 MMM-ACNS'10: Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

In this paper, we present a new framework of runtime security policy enforcement. Building on previous studies, we examine the enforcement power of monitors able to transform their target's execution, rather than simply accepting it if it is valid, or aborting it otherwise. We bound this ability by a restriction ...
Keywords: monitoring, inlined reference monitors, program transformation, security policy enforcement

7
October 2009 Proceedings of the 14th Nordic Conference on Identity and Privacy in the Internet Age - Volume 5838
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

A promising solution to the problem of securing potentially malicious mobile code lies in the use of program monitors. Such monitors can be in-lined into an untrusted program to produce an instrumented code that provably satisfies the security policy. It is well known that enforcement mechanisms based on Schneider's security ...
Keywords: Computer Security, Dynamic Analysis, Monitoring Software Safety

8
September 2009 NordSec '09: Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

A promising solution to the problem of securing potentially malicious mobile code lies in the use of program monitors. Such monitors can be in-lined into an untrusted program to produce an instrumented code that provably satisfies the security policy. It is well known that enforcement mechanisms based on Schneider's security ...
Keywords: Computer Security, Dynamic Analysis, Monitoring Software Safety



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us