Security Enhanced Java']Java: Mandatory Access Control for the Java']Java Virtual Machine

被引:0
|
作者
Venelle, Benjamin [1 ]
Briffaut, Jeremy [2 ]
Clevy, Laurent [1 ]
Toinard, Christian [2 ]
机构
[1] Alcatel Lucent Bell Labs, F-91620 Nozay, France
[2] ENSI LIFO, F-18020 Bourges, France
关键词
Mandatory Access Control; !text type='Java']Java[!/text] Virtual Machine; Security Context; Information Flow;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since 70's, and despite its operational complexity, Mandatory Access Control (MAC) has demonstrated its reliability to enforce integrity and confidentiality. Surprisingly, the Java technology, despite its popularity, has not yet adopted this protection principle. Current security features within the JVM (JAAS and bytecode verifier) can be bypassed, as demonstrated by summer 2012 attacks. Thus, a MAC model for Java and a cross platform reference monitor are required for the Java Virtual Machine. Security Enhanced Java (SEJava) enables to control dynamically the information flows between all the Java objects requiring neither bytecode nor source code instrumentations. The main idea is to consider Java types as security contexts, and method calls / field accesses as permissions. SEJava allows fine-grain MAC rules between the Java objects. Thus, SEJava controls all the information flows within the JVM. Our implementation is faster than concurrent approaches while allowing both finer and more advanced controls. A use case shows the efficiency to protect against Common Vulnerability and Exposures in an efficient manner.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A fault-tolerant Java']Java virtual machine
    Napper, J
    Alvisi, L
    Vin, H
    2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 425 - 434
  • [32] Auto-tuning the Java']Java Virtual Machine
    Jayasena, Sanath
    Fernando, Milinda
    Rusira, Tharindu
    Perera, Chalitha
    Philips, Chamara
    2015 IEEE 29TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS, 2015, : 1261 - 1270
  • [33] Garbage collection in an embedded Java']Java virtual machine
    Cha, Chang-Il
    Kim, Hyung-Jun
    Hwang, Kyu-Jeong
    Kim, Sang-Wook
    Lee, Sang-Yun
    Won, Hee-Sun
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 443 - 450
  • [34] A distributed access control model for Java']Java
    Molva, R
    Roudier, Y
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 291 - 308
  • [35] Operational semantics of the Java']Java Card Virtual Machine
    Siveroni, IA
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 58 (1-2): : 3 - 25
  • [36] A Java']Java Virtual Machine for smart sensors and actuators
    Serodio, Carlos M. J. A.
    Silva, Pedro M. Mestre A.
    Monteiro, Joado L.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, PROCEEDINGS, VOLS 1-8, 2007, : 1514 - +
  • [37] Java']Java Virtual Machine monitoring for dependability benchmarking
    Orlando, Salvatore
    Russo, Stefano
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 433 - 440
  • [38] Exploitation of multicore systems in a Java']Java virtual machine
    Sciampacone, R. A.
    Sundaresan, V.
    Maier, D.
    Gray-Donald, T.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2010, 54 (05)
  • [39] A Certified Implementation on Top of the Java']Java Virtual Machine
    de Dios, Javier
    Pena, Ricardo
    FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, 2009, 5825 : 181 - 196
  • [40] An Energy-Efficient Java']Java Virtual Machine
    Chen, Kuo-Yi
    Chang, J. Morris
    Hou, Ting-Wei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (02) : 263 - 275