Skip to Main content Skip to Navigation
Conference papers

Embedding Verifiable Information Flow Analysis

Abstract : Pervasive computing is the next generation of comput- ing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java byte- code adapted for applications dedicated to embedded sys- tems. Existing techniques are not well adapted to this do- main and are often too complex. To ease embedded oper- ations and reduce overhead, an external static analysis is performed initially, and the results are embedded as anno- tations within the code and certified at loading time. In con- trast with other analysis techniques, our model supports dy- namic class loading. We evaluated our model on a business case study involving an electronic wallet for air miles stor- age and management from the literature. We obtained the same results as the other papers but under more restrictive conditions related to inherent characteristics of embedded environments.
Document type :
Conference papers
Complete list of metadata
Contributor : Isabelle Simplot-Ryl Connect in order to contact the contributor
Submitted on : Thursday, December 9, 2010 - 11:59:55 AM
Last modification on : Wednesday, February 23, 2022 - 11:58:02 AM


  • HAL Id : inria-00544957, version 1



Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl. Embedding Verifiable Information Flow Analysis. Proc. 4th Annual Conference on Privacy, Security and Trust, 2006, Toronto, Canada. pp.343--352. ⟨inria-00544957⟩



Record views