Monitoring explicit information flow using Java byte-code instrumentation

نویسندگان

  • Mohamed Sarrab
  • Helge Janicke
چکیده

Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. that is made available by the end users of the software is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as credit card data, government intelligence or personal medical information being processed by software, the more important it is to ensure the confidentiality of this information. Monitoring untrusted programs during execution in an environment where sensitive information is present is difficult and unnerving. The issues is how to control the confidential information flow during untrusted program execution. In this paper we present one component of our novel framework for supporting user interaction with running program to modify the way information flow or to change program behaviour. We present prototype of our runtime verification framework of controlling information flow with more focus on Assertion points.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low-level analysis of a portable Java byte code WCET analysis framework

To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels – machine-independent program-flow analysis at a higher level and machine-dependent timing analysis of individual program constructs at a lower level. This paper contributes a WCET analysis that computes worst-case execution frequencies of Java-Byte Codes within the software being anal...

متن کامل

Automatically Exploiting Implicit Parallelism in Multi-way Recursive Methods in Java

In this paper we show how implicit parallelism in multi-way recursive methods, typically used to implement tree traversal or divide-and-conquer algorithms, can be made explicit by a restructuring compiler using the multi-threading mechanism of Java. Expressing parallelism in Java itself clearly has the advantage that the transformed program remains portable. After compilation of the transformed...

متن کامل

Portable worst-case execution time analysis using Java Byte Code

In this paper we address the problem of performing worst case execution time (WCET) analysis of Java Byte Code (JBC) which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper, how...

متن کامل

DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis

Taint analysis for Android malware has received much attention in recent research. Existing taint techniques operate either at Java object level or at deeper instruction level. Object-level tracking is suitable for malware written in Java byte-code, but not for native ones. Instruction-level tracking captures the finest data flow. However, it leads to obscure semantic reconstruction and low per...

متن کامل

Guaranteeing Correctness Properties of a Java Card Applet

The paper describes an experiment in which a framework for model checking Java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness properties of a Java Card applet.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010