An approach for analyzing bytecode information flow

被引:0
|
作者
Bian, GW [1 ]
Nakayama, K [1 ]
Kobayashi, Y [1 ]
Maekawa, M [1 ]
机构
[1] Univ Electrocommun, Dept Informat Syst, Tokyo, Japan
关键词
!text type='Java']Java[!/text] bytecode; dependence analysis; information flow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing approaches are inadequate to address the information flow in Java bytecode and the type systems verification often used in these approaches is imprecise. This paper presents a method to disclose Java bytecode information flow, in which the information dependence relationship among the variables in the bytecode is determined by data-flow analysis and information flow policy is verified by type-checking method. Since the analysis object is bytecode, this approach can be used for Java mobile code systems. The precision of verification can be improved because of this approach.
引用
收藏
页码:1060 / 1063
页数:4
相关论文
共 50 条
  • [21] Analyzing information flow control policies in requirements engineering
    Alghathbar, K
    Wijesekera, D
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 193 - 196
  • [22] ITM Probe: analyzing information flow in protein networks
    Stojmirovic, Aleksandar
    Yu, Yi-Kuo
    BIOINFORMATICS, 2009, 25 (18) : 2447 - 2449
  • [23] Analyzing Information Flow and Context for Facebook Fan Pages
    Kim, Kwanho
    Obregon, Josue
    Jung, Jae-Yoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (04): : 811 - 814
  • [24] A Matrix Approach for Analyzing Signal Flow Graph
    Jeng, Shyr-Long
    Roy, Rohit
    Chieng, Wei-Hua
    INFORMATION, 2020, 11 (12) : 1 - 18
  • [25] Verifiable control flow policies for Java bytecode
    Fontaine, Arnaud
    Hym, Samuel
    Simplot-Ryl, Isabelle
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7140 LNCS : 115 - 130
  • [26] DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode
    Chen, Jiachi
    Xia, Xin
    Lo, David
    Grundy, John
    Luo, Xiapu
    Chen, Ting
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021, 48 (07) : 2189 - 2207
  • [27] Analyzing the Cost of Safety for Vectorized Bytecode in Dynamically-Typed Languages
    Rainhart, Nicolas
    Polito, Guillermo
    Tesone, Pablo
    Ducasse, Stephane
    PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON MANAGED PROGRAMMING LANGUAGES AND RUNTIMES, MPLR 2022, 2022, : 140 - 140
  • [28] Hierarchical approach to analyzing security breaches in information systems
    Pavlenko E.Y.
    Yarmak A.V.
    Moskvin D.A.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 829 - 834
  • [29] MINIMUM DISCRIMINATION INFORMATION APPROACH IN ANALYZING CATEGORICAL DATA
    GOKHALE, DV
    KULLBACK, S
    COMMUNICATIONS IN STATISTICS PART A-THEORY AND METHODS, 1978, 7 (10): : 987 - 1005
  • [30] AN APPROACH TO ANALYZING THE INFORMATION-CONTENT OF EXISTING DATABASES
    BOULANGER, D
    MARCH, ST
    DATA BASE, 1989, 20 (02): : 1 - 8