Secure the Clones

Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to...

Full description

Bibliographic Details
Main Authors: Thomas Jensen, Florent Kirchner, David Pichardie
Format: Article
Language:English
Published: Logical Methods in Computer Science e.V. 2012-05-01
Series:Logical Methods in Computer Science
Subjects:
Online Access:https://lmcs.episciences.org/801/pdf