Title :
Data-Flow Based Analysis of Java Bytecode Vulnerability
Author :
Zhao, Gang ; Chen, Hua ; Wang, Dongxia
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
Abstract :
Java is widely used because its security and platform independence. Although Java´s security model is designed for protecting users from untrusted sources, Java´s security is not under fully control at the application level. A large number of Java classes or Java class libraries have been used in network iquest application development, whose source is unknown and trust unassured. Analyzing the vulnerability of Java bytecode is helpful for assessing the security of untrusted Java components. The data-flow based methods suit to vulnerability analysis because their data propagation character. The paper is about using data-flow based methods to analyze the vulnerability of Java program in bytecode.
Keywords :
Java; data flow analysis; object-oriented programming; safety-critical software; software libraries; Java bytecode vulnerability; Java class libraries; data-flow based analysis; untrusted Java component security; Computer science; Data analysis; Data engineering; Data security; Independent component analysis; Information analysis; Information management; Information security; Java; Systems engineering and theory; Java bytecode; data-flow; vulnerability analysis;
Conference_Titel :
Web-Age Information Management, 2008. WAIM '08. The Ninth International Conference on
Conference_Location :
Zhangjiajie Hunan
Print_ISBN :
978-0-7695-3185-4
Electronic_ISBN :
978-0-7695-3185-4
DOI :
10.1109/WAIM.2008.99