Verifiable control flow policies for java bytecode

FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust(2011)

引用 1|浏览1
暂无评分
摘要
This paper presents the enforcement of control flow policies for Java bytecode dedicated to open and constrained devices. On-device enforcement of security policies mostly relies on run-time monitoring or inline checking code, which is not appropriate for strongly constrained devices such as mobile phones and smart-cards. We present a proof-carrying code approach with on-device lightweight verification of control flow policies statically at loading-time. Our approach is suitable for evolving, open and constrained Java-based systems as it is compositional, to avoid re-verification of already verified bytecode upon loading of new bytecode, and it is regressive, to cleanly support bytecode unloading.
更多
查看译文
关键词
control flow policy,on-device enforcement,on-device lightweight verification,java-based system,mobile phone,proof-carrying code approach,java bytecode,verifiable control flow policy,inline checking code,control flow policies statically,new bytecode
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要