Security Enhanced Java']Java: Mandatory Access Control for the Java']Java Virtual Machine

被引:0
|
作者
Venelle, Benjamin [1 ]
Briffaut, Jeremy [2 ]
Clevy, Laurent [1 ]
Toinard, Christian [2 ]
机构
[1] Alcatel Lucent Bell Labs, F-91620 Nozay, France
[2] ENSI LIFO, F-18020 Bourges, France
关键词
Mandatory Access Control; !text type='Java']Java[!/text] Virtual Machine; Security Context; Information Flow;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since 70's, and despite its operational complexity, Mandatory Access Control (MAC) has demonstrated its reliability to enforce integrity and confidentiality. Surprisingly, the Java technology, despite its popularity, has not yet adopted this protection principle. Current security features within the JVM (JAAS and bytecode verifier) can be bypassed, as demonstrated by summer 2012 attacks. Thus, a MAC model for Java and a cross platform reference monitor are required for the Java Virtual Machine. Security Enhanced Java (SEJava) enables to control dynamically the information flows between all the Java objects requiring neither bytecode nor source code instrumentations. The main idea is to consider Java types as security contexts, and method calls / field accesses as permissions. SEJava allows fine-grain MAC rules between the Java objects. Thus, SEJava controls all the information flows within the JVM. Our implementation is faster than concurrent approaches while allowing both finer and more advanced controls. A use case shows the efficiency to protect against Common Vulnerability and Exposures in an efficient manner.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Formalizing the safety of Java']Java, the Java']Java virtual machine, and Java']Java card
    Hartel, PH
    Moreau, L
    ACM COMPUTING SURVEYS, 2001, 33 (04) : 517 - 558
  • [2] Asynchronous Java']Java accelerator for embedded Java']Java virtual machine
    Liang, Z
    Plosila, J
    Sere, K
    PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, 2004, : 253 - 256
  • [3] Lightweight Modeling of Java']Java Virtual Machine Security Constraints
    Reynolds, Mark C.
    ABSTRACT STATE MACHINES, ALLOY, B AND Z, PROCEEDINGS, 2010, 5977 : 146 - 159
  • [4] Checking Access to Protected Members in the Java']Java Virtual Machine
    Coglio, Alessandro
    JOURNAL OF OBJECT TECHNOLOGY, 2005, 4 (08): : 55 - 76
  • [5] A secure Java']Java™ Virtual Machine
    van Doom, L
    USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 19 - 34
  • [6] Preservation of proof obligations from Java']Java to the Java']Java virtual machine
    Barthe, Gilles
    Gregoire, Benjamin
    Pavlova, Mariela
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 83 - +
  • [7] Defining the Java']Java Virtual Machine as platform for provably correct Java']Java compilation
    Börger, E
    Schulte, W
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 1998, 1998, 1450 : 17 - 35
  • [8] Program analysis for safety guarantees in a Java']Java virtual machine written in Java']Java
    Maessen, JW
    Sarkar, V
    Grove, D
    ACM SIGPLAN NOTICES, 2001, : 62 - 65
  • [9] Minimizing Impact on Java']Java Virtual Machine via JAVA']JAVA Code Optimization
    Myalapalli, Vamsi Krishna
    Geloth, Sunitha
    2015 INTERNATIONAL CONFERENCE ON ENERGY SYSTEMS AND APPLICATIONS, 2015, : 19 - 24
  • [10] Evaluating the Java']Java virtual machine as a target for languages other than Java']Java
    Gough, KJ
    Corney, D
    MODULAR PROGRAMMING LANGUAGES, PROCEEDINGS, 2001, 1897 : 278 - 290