Secure Method Calls by Instrumenting Bytecode with Aspects

  • Authors:
  • Xiaofeng Yang;Mohammad Zulkernine

  • Affiliations:
  • School of Computing, Queen's University Kingston, Ontario, Canada K7L 3N6;School of Computing, Queen's University Kingston, Ontario, Canada K7L 3N6

  • Venue:
  • Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Today most mobile devices embed Java runtime environment for Java programs. Java applications running on mobile devices are mainly MIDP (Mobile Information Device Profile) applications. They can be downloaded from the Internet and installed directly on the device. Although the virtual machine performs type-safety checking or verifies bytecode with signed certificates from third-party, the program still has the possibility of containing risky code. Inappropriate use of sensitive method calls may cause loss of personal assets on mobile devices. Moreover, source code is not accessible for most installed applications, making it difficult to analyze the behavior at source-code level. To better protect the device from malicious code, we propose an approach of bytecode instrumentation with aspects at bytecode level. The instrumentation pinpoints the location of statements within methods, rather than at the interface of method calls. The aspects are woven around the statement for tracking. The weaving is performed at bytecode level without requiring source code of the program.