Security monitor inlining and certification for multithreaded Java
-
Published:2014-12-17
Issue:3
Volume:25
Page:528-565
-
ISSN:0960-1295
-
Container-title:Mathematical Structures in Computer Science
-
language:en
-
Short-container-title:Math. Struct. Comp. Sci.
Author:
DAM MADS,JACOBS BART,LUNDBLAD ANDREAS,PIESSENS FRANK
Abstract
Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), and otherwise interferes with the application as little as possible (conservativity and transparency). Such inliners are said to be correct. For sequential Java-like languages, inlining is well understood, and several provably correct inliners have been proposed. For multithreaded Java one difficulty is the need to maintain a shared monitor state. We show that this problem introduces fundamental limitations in the type of security policies that can be correctly enforced by inlining. A class of race-free policies is identified that precisely characterizes the inlineable policies by showing that inlining of a policy outside this class is either not secure or not transparent, and by exhibiting a concrete inliner for policies inside the class which is secure, conservative and transparent. The inliner is implemented for Java and applied to a number of practical application security policies. Finally, we discuss how certification in the style of proof-carrying code could be supported for inlined programs by using annotations to reduce a potentially complex verification problem for multithreaded Java bytecode to sequential verification of just the inlined code snippets.
Publisher
Cambridge University Press (CUP)
Subject
Computer Science Applications,Mathematics (miscellaneous)
Reference45 articles.
1. History effects and verification;Skalka;Asian Programming Languages Symposium,2004
2. S3MS (2008) Project web page. Available at http://www.s3ms.org.
3. Reynal S. (2010) Jpicedt website. Available at http://jpicedt.sourceforge.net/.
4. Proof-carrying code
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards the Generation of Correct Java Programs (Research Poster);2018 International Conference on High Performance Computing & Simulation (HPCS);2018-07