DocumentCode :
2880900
Title :
Abstract interpretation for mobile code security
Author :
Lu, Dan ; Nakayama, Ken ; Kobayashi, Yoshitake ; Maekawa, Mamoru
Author_Institution :
Graduate Sch. of Inf. Syst., Univ. of Electro-Commun., Tokyo, Japan
Volume :
2
fYear :
2005
fDate :
12-14 Oct. 2005
Firstpage :
1104
Lastpage :
1107
Abstract :
To resolve the security problems of Java mobile code, we adapted the technique of type-level abstract interpretation to verify the security of mobile code statically. Instead of data types, the mobile code is executed abstractly at the level of security-level in our approach. Based on maintaining a distribution map of security-levels of the data in mobile code´s data containers, our approach detects data-leaking just before the mobile code tries to send sensitive data out of the host. By this way our approach could make less misjudgment that verifies secure mobile programs as malicious and be more efficient than the works in Bernardeschi C et al, (2002) and Avvenuti, M et al, (2003).
Keywords :
Java; distributed programming; security of data; Java mobile code security problems; abstract interpretation; data-leak detection; mobile code data containers; mobile code security; security-level distribution map; type-level abstract interpretation; Access control; Algorithms; Authentication; Containers; Data security; Information security; Information systems; Java; Mobile computing; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on
Print_ISBN :
0-7803-9538-7
Type :
conf
DOI :
10.1109/ISCIT.2005.1567061
Filename :
1567061
Link To Document :
بازگشت