Security of Java programs is important as they can be executed in different platforms. This paper addresses the problem of secure information flow for Java bytecode. In information flow analysis one wishes to check if high security data can ever propagate to low security observers. We propose a static analysis similar to the type-level abstract interpretation used for standard bytecode verification. Instead of types, our technique works with secrecy levels assigned to classes, methods' parameters and returned values, and handles implicit information flows. A verification tool based on the proposed technique is under development. Using the tool, programs downloaded from untrusted hosts can be checked locally prior to executing them
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Bytecode verification is a crucial security component for Java applets, on the Web and on embedded d...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
AbstractExisting Java verifiers perform an iterative data-flow analysis to discover the unambiguous ...
International audienceBytecode verification is a crucial security component for Java applets, on the...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Although there are many approaches for developing secure programs, they are not necessarily helpful ...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
This thesis is concerned with static code analysis. More particularly, with code analysis techniques...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
It is a common practice to retrieve code from an outside source, execute it and return the result to...
We present an approach enabling end-users to prove security properties of the Java bytecode by stati...
Bytecode verification is a crucial security component for Java applets, on the Web and on embedded d...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
AbstractExisting Java verifiers perform an iterative data-flow analysis to discover the unambiguous ...
International audienceBytecode verification is a crucial security component for Java applets, on the...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
Although there are many approaches for developing secure programs, they are not necessarily helpful ...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...
International audienceIn this paper we present a flow-sensitive analysis for secure informa- tion fl...