DISSERTATION

Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis

Abstract

The removal of halogenated dye and sensing of pharmaceutical products in the water bodies with quick purification time is of high need due to the scarcity of drinking water. The present work reported on the preparation of graphitic carbon nitride (g-C3N4) for quick time water contaminant adsorption, followed by synthesizing silver nanoparticles decorated graphitic carbon nitride for pharmaceutical product sensing using in-situ SERS technique. The prepared graphitic carbon nitride is used to study the adsorption behavior of water contaminants at room temperature, in the presence of methylene blue (MB) as an adsorbate model. The water-soluble graphitic carbon nitride, even at low concentration, possesses an excellent ability to adsorb halogenated organic dye. As a result, the dyes are found to adsorb within ∼5s even without any additional physical or chemical activation. From the UV-Vis absorption investigations, it has been perceived that in the presence of graphitic carbon nitride (g-C3N4) the dye adsorption efficacy is observed nearly 80% with the well fitted linearly of R2 = 0.9731. Effective in-situ surface-enhanced Raman scattering (SERS) studies for Ag nanoparticles decorated graphitic carbon nitride has been carried out and the obtained result shows good sensing performance of the material towards acetaminophen drug. This method opens the possibility of the Nobel metal decorated graphitic carbon nitride for real-time sensing of SERS-based drug products along with the development of high-performance sensing of the target analyte in the future.

Keywords:
Computer science Computer security Code (set theory) Confidentiality Redundant code Unreachable code Dead code Object code Code generation Programming language Key (lock) Set (abstract data type)

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Journal:   Greater South Information System Year: 2009
JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Journal:   Journal of Computer Science Year: 2009 Vol: 5 (2)Pages: 163-171
JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Mahmod

Journal:   Journal of Computer Science Year: 2009 Vol: 5 (2)Pages: 163-171
JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Journal:   Greater South Information System Year: 2009
JOURNAL ARTICLE

Proof-Carrying Code

George C. Necula

Year: 2011 Pages: 984-986
© 2026 ScienceGate Book Chapters — All rights reserved.