DocumentCode :
2549650
Title :
Data-Flow Based Analysis of Java Bytecode Vulnerability
Author :
Zhao, Gang ; Chen, Hua ; Wang, Dongxia
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
fYear :
2008
fDate :
20-22 July 2008
Firstpage :
647
Lastpage :
653
Abstract :
Java is widely used because its security and platform independence. Although Java´s security model is designed for protecting users from untrusted sources, Java´s security is not under fully control at the application level. A large number of Java classes or Java class libraries have been used in network iquest application development, whose source is unknown and trust unassured. Analyzing the vulnerability of Java bytecode is helpful for assessing the security of untrusted Java components. The data-flow based methods suit to vulnerability analysis because their data propagation character. The paper is about using data-flow based methods to analyze the vulnerability of Java program in bytecode.
Keywords :
Java; data flow analysis; object-oriented programming; safety-critical software; software libraries; Java bytecode vulnerability; Java class libraries; data-flow based analysis; untrusted Java component security; Computer science; Data analysis; Data engineering; Data security; Independent component analysis; Information analysis; Information management; Information security; Java; Systems engineering and theory; Java bytecode; data-flow; vulnerability analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Web-Age Information Management, 2008. WAIM '08. The Ninth International Conference on
Conference_Location :
Zhangjiajie Hunan
Print_ISBN :
978-0-7695-3185-4
Electronic_ISBN :
978-0-7695-3185-4
Type :
conf
DOI :
10.1109/WAIM.2008.99
Filename :
4597080
Link To Document :
بازگشت