Automated Analysis of Java Methods for Confidentiality

نویسندگان

  • Pavol Cerný
  • Rajeev Alur
چکیده

We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants to keep secret. Existing software model checking tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. We develop an automated analysis technique for such properties. We show that both overand underapproximation is needed for sound analysis. Given a program and a confidentiality requirement, our technique produces a formula that is satisfiable if the requirement holds. We evaluate the approach by analyzing bytecode of a set of Java ( J2ME) methods. Disciplines Computer Sciences Comments From the 21st International Conference, CAV 2009, Grenoble, France, June 26 July 2, 2009. This conference paper is available at ScholarlyCommons: http://repository.upenn.edu/cis_papers/550 Automated Analysis of Java Methods for Confidentiality Pavol Černý and Rajeev Alur University of Pennsylvania {cernyp,alur}@cis.upenn.edu Abstract. We address the problem of analyzing programs such as J2ME We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants to keep secret. Existing software model checking tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. We develop an automated analysis technique for such properties. We show that both overand underapproximation is needed for sound analysis. Given a program and a confidentiality requirement, our technique produces a formula that is satisfiable if the requirement holds. We evaluate the approach by analyzing bytecode of a set of Java (J2ME) methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Analysis of Programs for Confidentiality

Software model checking has emerged as an effective technique for checking programs with respect to correctness requirements. Existing tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. In this paper, we develop an automated analysis technique for such properties. A motivating appl...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A Privacy Framework within the Java Data Security Framework (JDSF): Design Refinement, Implementation, and Statistics

We present a refinement design of something we call a Confidentiality Framework, which is a part of a more general formation, that we refer to as a Java Data Security Framework (JDSF), a workin-progress designed to support various aspects that are related to data security (confidentiality, origin authentication, integrity, etc. where this paper only focuses on the confidentiality aspect). The d...

متن کامل

Java Mobile Code Security by Bytecode Analysis

Since mobile code can migrate from a remote site to a host and can interact with the resources and facilities of the host, security becomes the key to the success of mobile code computation. Existing mobile code security mechanisms such as access control are not able to fully address the import security properties of the host including confidentiality and integrity. And these practices tend to ...

متن کامل

Semi-quantitative segmental perfusion scoring in myocardial perfusion SPECT: visual vs. automated analysis

Introduction: It is recommended that the physician apply at least a semi-quantitative segmental scoring system in myocardial perfusion SPECT.  We aimed to assess the agreement between automated semi-quantitative analysis using QPS (quantitative Perfusion SPECT) software and visual approach for calculation of summed stress  score (SSS), summed rest score (SRS) and summed difference score (SDS). ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009