کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
433418 1441706 2013 16 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Modeling the Java Bytecode Verifier
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Modeling the Java Bytecode Verifier
چکیده انگلیسی

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting these bytecodes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to potentially insecure code. Analysis of the approach is provided in the context of known security exploits, including type confusion attacks, invalid memory accesses and control flow misdirection. This type of analysis represents a significant departure from standard malware analysis methods based on signatures or anomaly detection.


► A new approach to identifying malicious software.
► Uses the Alloy modeling/specification language.
► A translator converts software to be checked into Alloy.
► The security specification is also written in Alloy.
► Any counterexample is a security vulnerability.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Science of Computer Programming - Volume 78, Issue 3, 1 March 2013, Pages 327–342
نویسندگان
,