Security monitor inlining and certification for multithreaded Java']Java

被引:1
|
作者
Dam, Mads [1 ]
Jacobs, Bart [2 ]
Lundblad, Andreas [1 ]
Piessens, Frank [2 ]
机构
[1] Royal Inst Technol KTH, SE-10044 Stockholm, Sweden
[2] Katholieke Univ Leuven, B-3001 Louvain, Belgium
关键词
ENFORCEMENT;
D O I
10.1017/S0960129512000916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), and otherwise interferes with the application as little as possible (conservativity and transparency). Such inliners are said to be correct. For sequential Java-like languages, inlining is well understood, and several provably correct inliners have been proposed. For multithreaded Java one difficulty is the need to maintain a shared monitor state. We show that this problem introduces fundamental limitations in the type of security policies that can be correctly enforced by inlining. A class of race-free policies is identified that precisely characterizes the inlineable policies by showing that inlining of a policy outside this class is either not secure or not transparent, and by exhibiting a concrete inliner for policies inside the class which is secure, conservative and transparent. The inliner is implemented for Java and applied to a number of practical application security policies. Finally, we discuss how certification in the style of proof-carrying code could be supported for inlined programs by using annotations to reduce a potentially complex verification problem for multithreaded Java bytecode to sequential verification of just the inlined code snippets.
引用
收藏
页码:528 / 565
页数:38
相关论文
共 50 条
  • [31] Towards the automated verification of multithreaded Java']Java programs
    Delzanno, G
    Raskin, JF
    Van Begin, L
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANAYLSIS OF SYSTEMS, PROCEEDINGS, 2002, 2280 : 173 - 187
  • [32] Java']Java security
    Foote, B
    [J]. IEEE SPECTRUM, 1999, 36 (10) : 6 - +
  • [33] Java']Java security
    Boukanov, I
    [J]. DR DOBBS JOURNAL, 1997, 22 (09): : 10 - 10
  • [34] An assertion-based proof system for multithreaded Java']Java
    Abraham, E
    de Boer, FS
    de Roever, WP
    Steffen, M
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 331 (2-3) : 251 - 290
  • [35] Shape truss optimization in Java']Java multithreaded genetic program
    Czarnecki, S
    [J]. TOPOLOGY OPTIMIZATION OF STRUCTURES AND COMPOSITE CONTINUA, 2000, 7 : 347 - 349
  • [36] Implementing control algorithms within a multithreaded Java']Java microcontroller
    Brinkschulte, U
    Pacher, M
    [J]. SYSTEMS ASPECTS IN ORGANIC AND PERVASIVE COMPUTING - ARCS 2005, PROCEEDINGS, 2005, 3432 : 33 - 49
  • [37] Checkmate: a Generic Static Analyzer of Java']Java Multithreaded Programs
    Ferrara, Pietro
    [J]. SEFM 2009: SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, 2009, : 169 - 178
  • [38] A tool-supported proof system for multithreaded Java']Java
    Abrahám, E
    de Boer, FS
    de Roever, WP
    Steffen, M
    [J]. FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2003, 2852 : 1 - 32
  • [39] Automatic Detection of Shared Objects in Multithreaded Java']Java Programs
    Tolubaeva, Munara
    Can, Aysu Betin
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, 2008, : 522 - 526
  • [40] An empirical study of method inlining for a Java']Java just-in-time compiler
    Suganuma, T
    Yasue, T
    Nakatani, T
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2ND JAVA(TM) VIRTUAL MACHINE RESEARCH AND TECHNOLOGY SYMPOSIUM, 2002, : 91 - 104