Verifiable control flow policies for java bytecode

  • Authors:
  • Arnaud Fontaine;Samuel Hym;Isabelle Simplot-Ryl

  • Affiliations:
  • INRIA Lille - Nord Europe, Univ Lille Nord de France, USTL, CNRS LIFL, France;INRIA Lille - Nord Europe, Univ Lille Nord de France, USTL, CNRS LIFL, France;INRIA Lille - Nord Europe, Univ Lille Nord de France, USTL, CNRS LIFL, France

  • Venue:
  • FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents the enforcement of control flow policies for Java bytecode dedicated to open and constrained devices. On-device enforcement of security policies mostly relies on run-time monitoring or inline checking code, which is not appropriate for strongly constrained devices such as mobile phones and smart-cards. We present a proof-carrying code approach with on-device lightweight verification of control flow policies statically at loading-time. Our approach is suitable for evolving, open and constrained Java-based systems as it is compositional, to avoid re-verification of already verified bytecode upon loading of new bytecode, and it is regressive, to cleanly support bytecode unloading.