Embedding verifiable information flow analysis

  • Authors:
  • Dorina Ghindici;Gilles Grimaud;Isabelle Simplot-Ryl

  • Affiliations:
  • Université de Lille I, Villeneuve d'Ascq, Cedex, France;Université de Lille I, Villeneuve d'Ascq, Cedex, France;Université de Lille I, Villeneuve d'Ascq, Cedex, France

  • Venue:
  • Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Pervasive computing is the next generation of computing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java bytecode adapted for applications dedicated to embedded systems. Existing techniques are not well adapted to this domain and are often too complex. To ease embedded operations and reduce overhead, an external static analysis is performed initially, and the results are embedded as annotations within the code and certified at loading time. In contrast with other analysis techniques, our model supports dynamic class loading. We evaluated our model on a business case study involving an electronic wallet for air miles storage and management from the literature. We obtained the same results as the other papers but under more restrictive conditions related to inherent characteristics of embedded environments.