Embedding Verifiable Information Flow Analysis

Abstract : Pervasive computing is the next generation of comput- ing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java byte- code adapted for applications dedicated to embedded sys- tems. Existing techniques are not well adapted to this do- main and are often too complex. To ease embedded oper- ations and reduce overhead, an external static analysis is performed initially, and the results are embedded as anno- tations within the code and certified at loading time. In con- trast with other analysis techniques, our model supports dy- namic class loading. We evaluated our model on a business case study involving an electronic wallet for air miles stor- age and management from the literature. We obtained the same results as the other papers but under more restrictive conditions related to inherent characteristics of embedded environments.
Type de document :
Communication dans un congrès
McGraw-Hill. Proc. 4th Annual Conference on Privacy, Security and Trust, 2006, Toronto, Canada. pp.343--352, 2006
Liste complète des métadonnées

https://hal.inria.fr/inria-00544957
Contributeur : Isabelle Simplot-Ryl <>
Soumis le : jeudi 9 décembre 2010 - 11:59:55
Dernière modification le : jeudi 11 janvier 2018 - 06:22:13

Identifiants

  • HAL Id : inria-00544957, version 1

Collections

Citation

Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl. Embedding Verifiable Information Flow Analysis. McGraw-Hill. Proc. 4th Annual Conference on Privacy, Security and Trust, 2006, Toronto, Canada. pp.343--352, 2006. 〈inria-00544957〉

Partager

Métriques

Consultations de la notice

82