An approach for analyzing bytecode information flow

被引:0
|
作者
Bian, GW [1 ]
Nakayama, K [1 ]
Kobayashi, Y [1 ]
Maekawa, M [1 ]
机构
[1] Univ Electrocommun, Dept Informat Syst, Tokyo, Japan
关键词
!text type='Java']Java[!/text] bytecode; dependence analysis; information flow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing approaches are inadequate to address the information flow in Java bytecode and the type systems verification often used in these approaches is imprecise. This paper presents a method to disclose Java bytecode information flow, in which the information dependence relationship among the variables in the bytecode is determined by data-flow analysis and information flow policy is verified by type-checking method. Since the analysis object is bytecode, this approach can be used for Java mobile code systems. The precision of verification can be improved because of this approach.
引用
收藏
页码:1060 / 1063
页数:4
相关论文
共 50 条
  • [1] Information flow analysis for Java']Java bytecode
    Genaim, S
    Spoto, F
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, PROCEEDINGS, 2005, 3385 : 346 - 362
  • [2] Hybrid Information Flow Analysis for Python']Python Bytecode
    Chen, Zhifei
    Chen, Lin
    Xu, Baowen
    2014 11TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2014, : 95 - 100
  • [3] Java bytecode dependence analysis for secure information flow
    Bian, Gaowei
    Nakayama, Ken
    Kobayashi, Yoshitake
    Maekawa, Mamoru
    International Journal of Network Security, 2007, 4 (01) : 59 - 68
  • [4] Java']Java bytecode verification for secure information flow
    Avvenuti, M
    Bernardeschi, C
    De Francesco, N
    ACM SIGPLAN NOTICES, 2003, 38 (12) : 20 - 27
  • [5] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    Martini, L
    SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
  • [6] Analyzing Explicit Information Flow
    Rajamani, Sriram K.
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 1 - 2
  • [7] Using standard verifier to check secure information flow in Java']Java bytecode
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 850 - 855
  • [8] Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java']Java Applications
    Sharaf, Mohamed
    Huang, Jie
    Huang, Chin-Tser
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 362 - 367
  • [9] Timing Aware Information Flow Security for a Java']JavaCard-like Bytecode
    Hedin, Daniel
    Sands, David
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 141 (01) : 163 - 182
  • [10] A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode
    Hamann, Tobias
    Herda, Mihai
    Mantel, Heiko
    Mohr, Martin
    Schneider, David
    Tasch, Markus
    SECURE IT SYSTEMS, 2018, 11252 : 437 - 453