Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
Java Virtual Machine Specification
Java Virtual Machine Specification
Java Bytecode Verification: An Overview
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis
Modeling the Java Bytecode Verifier
Science of Computer Programming
Hi-index | 0.00 |
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of a real world malicious applet is given to demonstrate the efficacy of the approach. This type of analysis represents a significant departure from standard malware detection methods based on signatures or anomaly detection.