Monitoring explicit information flow using Java byte-code instrumentation
نویسندگان
چکیده
Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. that is made available by the end users of the software is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as credit card data, government intelligence or personal medical information being processed by software, the more important it is to ensure the confidentiality of this information. Monitoring untrusted programs during execution in an environment where sensitive information is present is difficult and unnerving. The issues is how to control the confidential information flow during untrusted program execution. In this paper we present one component of our novel framework for supporting user interaction with running program to modify the way information flow or to change program behaviour. We present prototype of our runtime verification framework of controlling information flow with more focus on Assertion points.
منابع مشابه
Low-level analysis of a portable Java byte code WCET analysis framework
To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels – machine-independent program-flow analysis at a higher level and machine-dependent timing analysis of individual program constructs at a lower level. This paper contributes a WCET analysis that computes worst-case execution frequencies of Java-Byte Codes within the software being anal...
متن کاملAutomatically Exploiting Implicit Parallelism in Multi-way Recursive Methods in Java
In this paper we show how implicit parallelism in multi-way recursive methods, typically used to implement tree traversal or divide-and-conquer algorithms, can be made explicit by a restructuring compiler using the multi-threading mechanism of Java. Expressing parallelism in Java itself clearly has the advantage that the transformed program remains portable. After compilation of the transformed...
متن کاملPortable worst-case execution time analysis using Java Byte Code
In this paper we address the problem of performing worst case execution time (WCET) analysis of Java Byte Code (JBC) which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper, how...
متن کاملDROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis
Taint analysis for Android malware has received much attention in recent research. Existing taint techniques operate either at Java object level or at deeper instruction level. Object-level tracking is suitable for malware written in Java byte-code, but not for native ones. Instruction-level tracking captures the finest data flow. However, it leads to obscure semantic reconstruction and low per...
متن کاملGuaranteeing Correctness Properties of a Java Card Applet
The paper describes an experiment in which a framework for model checking Java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness properties of a Java Card applet.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010