Provably correct runtime monitoring

被引:5
|
作者
Aktug, Irem [1 ]
Dam, Mads [1 ]
Gurov, Dilian
机构
[1] KTH, Sch Comp Sci & Commun, ACCESS Linnaeus Ctr, Stockholm, Sweden
来源
基金
瑞典研究理事会;
关键词
Runtime monitoring; Policy enforcement; Monitor inlining; Proof-carrying code; !text type='JAVA']JAVA[!/text; ENFORCEMENT;
D O I
10.1016/j.jlap.2008.12.002
中图分类号
学科分类号
摘要
Runtime monitoring is an established technique to enforce a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has a copy of the given monitor embedded into it. As the main application of these results we sketch a simple inlining algorithm and show how the two-level annotations can be completed to produce a fully annotated program which is valid in the standard sense of Floyd/Hoare logic. This establishes the mediation property that inlined programs are guaranteed to adhere to the intended policy. Furthermore, validity can be checked efficiently using a weakest precondition based annotation checker, thus preparing the ground for on-device checking of policy adherence in a proof-carrying code setting. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:304 / 339
页数:36
相关论文
共 50 条
  • [31] Provably correct edgel linking and subpixel boundary reconstruction
    Koethe, Ullrich
    Stelldinger, Peer
    Meine, Hans
    [J]. PATTERN RECOGNITION, PROCEEDINGS, 2006, 4174 : 81 - 90
  • [32] Provably correct hardware compilation using timing diagrams
    Schenke, M
    Dossis, M
    [J]. FORMAL METHODS FOR PROTOCOL ENGINEERING AND DISTRIBUTED SYSTEMS, 1999, 28 : 313 - 331
  • [33] Synthesis of Provably Correct Autonomy Protocols for Shared Control
    Cubuktepe, Murat
    Jansen, Nils
    Alshiekh, Mohammed
    Topcu, Ufuk
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (07) : 3251 - 3258
  • [34] A Control Architecture for Provably-Correct Autonomous Driving
    Aasi, Erfan
    Vasile, Cristian Ioan
    Belta, Calin
    [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 2913 - 2918
  • [35] Provably-Correct and Comfortable Adaptive Cruise Control
    Althoff, Matthias
    Maierhofer, Sebastian
    Pek, Christian
    [J]. IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2021, 6 (01): : 159 - 174
  • [36] Cooperative runtime monitoring
    Halle, Sylvain
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2013, 7 (04) : 395 - 423
  • [37] Predictable Runtime Monitoring
    Zhu, Haitao
    Dwyer, Matthew B.
    Goddard, Steve
    [J]. PROCEEDINGS OF THE 21ST EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS, 2009, : 173 - 183
  • [38] A Foundation for Runtime Monitoring
    Francalanza, Adrian
    Aceto, Luca
    Achilleos, Antonis
    Attard, Duncan Paul
    Cassar, Ian
    Della Monica, Dario
    Ingolfsdottir, Anna
    [J]. RUNTIME VERIFICATION (RV 2017), 2017, 10548 : 8 - 29
  • [39] A Provably-Correct Micro-Dalvik Bytecode Verifier
    Jiang Nan
    He Yanxiang
    Zhang Xiaotong
    Liu Rui
    Shen Yunfei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 193 - 210
  • [40] Provably Correct Design of Observations for Fault Detection with Privacy Preservation
    Xu, Zhe
    Saha, Sayan
    Julius, Agung
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,