Matching in security-by-contract for mobile code

نویسندگان

  • Nataliia Bielova
  • Nicola Dragoni
  • Fabio Massacci
  • Katsiaryna Naliuka
  • Ida Siahaan
چکیده

We propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature should not just certify the origin of the code but rather bind together the code with a contract. We provide a description of the workflow for the deployment and execution of mobile code in the setting of security-by-contract, describe a structure for a contractual language and propose a number of algorithms for one of the key steps in the process, the contractpolicy matching issue. We also describe the prototype for matching policies with security claims of mobile applications that we have currently implemented. We argue that security-by-contract would provide a semantics for digital signatures on mobile code thus being a step in the transition from trusted code to trustworthy code.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code

In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature should not just certify the origin of the code but rather bind together the code with a contract. We provide a description of the overall lifecycle of mobile code in the setting of security-by-contract, describe a tenta...

متن کامل

Impact of a Contract Farming Scheme on Income, Food Security, and Nutrition among Maize Farmers in North Western, Nigeria

Background: The study examined the impact of a contract farming scheme on the farmers’ income, food security, and nutrition. Methods: Simple random sampling was used to select 100 respondents for the study. Data were analyzed using descriptive and inferential statistics as well the Propensity Score Matching technique. Results: The major determinants of participation in contract farming included...

متن کامل

Matching Midlet's Security Claims with a Platform Security Policy using Automata Modulo Theory

Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on its security behavior that could be matched against a mobile platform policy before downloading the code. In this paper we show that it is possible to de ne very expressive policies | essentially with in nite cases | that can capture realistic scenarios (e.g. "only connections to urls starting with...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

Testing Decision Procedures for Security - by - Contract ∗

The traditional realm of formal methods is the off-line verification of formal properties of hardware and software. In this paper we report a different approach that uses formal methods (namely the integration of automata modulo theory with decision procedures) on-the-fly, at the time an application is downloaded on a mobile application such as PDA or a smart phone. The idea behind security-by-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Log. Algebr. Program.

دوره 78  شماره 

صفحات  -

تاریخ انتشار 2009