Information flow analysis for Java']Java bytecode

被引:0
|
作者
Genaim, S [1 ]
Spoto, F [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37134 Verona, Italy
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a flow and context sensitive compositional information flow analysis for full (mono-threaded) Java bytecode. We base our analysis on the transformation of the Java bytecode into a control-flow graph of basic blocks of code which makes explicit the complex features of the Java bytecode. We represent information flows through Boolean functions and hence implement an accurate and efficient information flow analysis through binary decision diagrams. To the best of our knowledge, it is the first one for full Java bytecode.
引用
收藏
页码:346 / 362
页数:17
相关论文
共 50 条
  • [1] Java']Java bytecode verification for secure information flow
    Avvenuti, M
    Bernardeschi, C
    De Francesco, N
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (12) : 20 - 27
  • [2] SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java']Java Bytecode
    Geraldo, Eduardo
    Seco, Joao Costa
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (302): : 16 - 31
  • [3] Using data flow analysis to infer type information in Java']Java bytecode
    Maggi, P
    Sisto, R
    [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 211 - 222
  • [4] Java bytecode dependence analysis for secure information flow
    Bian, Gaowei
    Nakayama, Ken
    Kobayashi, Yoshitake
    Maekawa, Mamoru
    [J]. International Journal of Network Security, 2007, 4 (01) : 59 - 68
  • [5] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    Martini, L
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
  • [6] Termination analysis of Java']Java Bytecode
    Albert, Elvira
    Arenas, Puri
    Codish, Michael
    Genaim, Samir
    Puebla, German
    Zanardini, Damiano
    [J]. FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2008, 5051 : 2 - +
  • [7] Using standard verifier to check secure information flow in Java']Java bytecode
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    [J]. 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 850 - 855
  • [8] Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java']Java Applications
    Sharaf, Mohamed
    Huang, Jie
    Huang, Chin-Tser
    [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 362 - 367
  • [9] Cost analysis of Java']Java bytecode
    Albert, E.
    Arenas, P.
    Genaim, S.
    Puebla, G.
    Zanardini, D.
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2007, 4421 : 157 - +
  • [10] Dependence analysis of Java']Java bytecode
    Zhao, JJ
    [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 486 - 491