Modular string-sensitive permission analysis with demand-driven precision

In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too m...

Full description

Saved in:
Bibliographic Details
Published in:2009 IEEE 31st International Conference on Software Engineering pp. 177 - 187
Main Authors: Geay, Emmanuel, Pistoia, Marco, Takaaki Tateishi, Ryder, Barbara G., Dolby, Julian
Format: Conference Proceeding
Language:English
Published: Washington, DC, USA IEEE Computer Society 16.05.2009
IEEE
Series:ACM Conferences
Subjects:
ISBN:9781424434534, 142443453X
ISSN:0270-5257
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work.
AbstractList In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work.
Author Geay, Emmanuel
Takaaki Tateishi
Ryder, Barbara G.
Dolby, Julian
Pistoia, Marco
Author_xml – sequence: 1
  givenname: Emmanuel
  surname: Geay
  fullname: Geay, Emmanuel
  organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA
– sequence: 2
  givenname: Marco
  surname: Pistoia
  fullname: Pistoia, Marco
  organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA
– sequence: 3
  surname: Takaaki Tateishi
  fullname: Takaaki Tateishi
  organization: IBM Tokyo Research Laboratory, Japan
– sequence: 4
  givenname: Barbara G.
  surname: Ryder
  fullname: Ryder, Barbara G.
  organization: Virginia Tech, Blacksburg, USA
– sequence: 5
  givenname: Julian
  surname: Dolby
  fullname: Dolby, Julian
  organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA
BookMark eNqNkE9LAzEQxQMqWGs_gHjZs7B18s8kRylVCxUP6jlkk6xGu9mSrEq_vVla785lDr_3hnnvDB3HPnqELjDMMQZ1vVo8L-cEQM05COBYHaGZEhIzwhhlnLJjNAEioOaEi1M0y_kDyhSCpZqg1WPvvjYmVXlIIb7V2ccchvDtq61PXcg59LEy0Wx2OeTqJwzvlfOdia52qahitU3ehlF1jk5as8l-dthT9Hq3fFk81Oun-9Xidl0bwvFQ0xsGXCqjyrtENBw3jNtWNdxab4QVBjshKVdApHTWOemoaRhuXcttiQV0ii73d4P3Xm9T6Eza6UP4QmFPje100_efWWPQY1N6bEqPTf2JdZOCb4vl6t8W-gt5rWrV
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ICSE.2009.5070519
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 187
ExternalDocumentID 5070519
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IH
6IK
6IL
6IM
6IN
AAJGR
AARBI
ACM
ADPZR
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
IERZE
OCL
RIE
RIL
RIO
-~X
.4S
.DC
123
23M
29O
5VS
8US
AAWTH
ABLEC
ADZIZ
AFFNX
ARCSS
AVWKF
CHZPO
EDO
FEDTE
I-F
I07
IEGSK
IJVOP
IPLJI
M43
RNS
XOL
ID FETCH-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103
IEDL.DBID RIE
ISBN 9781424434534
142443453X
ISICitedReferencesCount 10
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0270-5257
IngestDate Wed Aug 27 02:03:50 EDT 2025
Wed Jan 31 06:38:21 EST 2024
Wed Jan 31 06:42:45 EST 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103
PageCount 11
ParticipantIDs acm_books_10_1109_ICSE_2009_5070519_brief
acm_books_10_1109_ICSE_2009_5070519
ieee_primary_5070519
PublicationCentury 2000
PublicationDate 20090516
2009-May
PublicationDateYYYYMMDD 2009-05-16
2009-05-01
PublicationDate_xml – month: 05
  year: 2009
  text: 20090516
  day: 16
PublicationDecade 2000
PublicationPlace Washington, DC, USA
PublicationPlace_xml – name: Washington, DC, USA
PublicationSeriesTitle ACM Conferences
PublicationTitle 2009 IEEE 31st International Conference on Software Engineering
PublicationTitleAbbrev ICSE
PublicationYear 2009
Publisher IEEE Computer Society
IEEE
Publisher_xml – name: IEEE Computer Society
– name: IEEE
SSID ssj0000453189
ssj0006499
Score 1.8120534
Snippet In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to...
SourceID ieee
acm
SourceType Publisher
StartPage 177
SubjectTerms Algorithm design and analysis
Authorization
General and reference -- Cross-computing tools and techniques -- Reliability
Inspection
Java
Laboratories
Permission
Prototypes
Runtime environment
Security
Software and its engineering -- Software notations and tools
Software and its engineering -- Software organization and properties -- Extra-functional properties -- Software reliability
Testing
Title Modular string-sensitive permission analysis with demand-driven precision
URI https://ieeexplore.ieee.org/document/5070519
WOSCitedRecordID wos000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH60xYOnqq1YNwb0Ijg2y2SZc2mxB0tBhd7CbJEempa09fc7L5lUBA96SzJDMjwmb976fQD3XMQR08ajOTfWQQkCTaXxcpqkSlmd6etQ6opsIpnN0sWCz1vweOiFMcZUxWfmCS-rXL5eqz2GyobWdkGLow3tJInrXq1DPMWaJnZ78oMWjlnFHWm9Lo8i4mfT1BXaeYsG68ndM5fu9D0-nI5exzWMpfsaHltq9YN8pTp7Jt3_rfoE-t9NfGR-OJ5OoWWKM-g2LA7E_dQ9mL6sNdaiEmTwKD7oFkvaUQmSDRbKYJVsQYTDLiEYtyXarEShqS5RVZJN6Xh6-vA-Gb-NnqkjWKDCmjU7GsYMWQUFt0sMEhn5kkUq5zJSyohEJcLXGBhCgJdUK61THQrJ_FznkbLi88Jz6BTrwlwACfIgMClCVQifCaasHyZCJpV9sWd4rgdwZ6WYoeewzSrHw-MZyhp5MHnmZDSAhz_MymS5NPkAeijrbFOjcjSDl78_voLjOg-EpYrX0NmVe3MDR-pzt9yWt9VW-gK7Kb6k
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bT8IwFD5BNNEnVDDitYm-mFjZpWPrM4FABEIiJrwtXdsZHhhkgL_fnt2MiQ_6tq3N1px0p-f6fQCPXHQ9prRFY66Ng-I4ikbaiqkfSGl0pq3cSGVkE_50GiwWfFaD56oXRmudFZ_pF7zMcvlqLfcYKusY2wUtjgM49BhzrLxbq4qoGOPEbFBe6eEuy9gjjd9lUcT8LNu6XDNvUaI9FfesSHjaFu-Mem_9HMiy-B4eXHL1g34lO30Gjf-t-xRa3218ZFYdUGdQ08k5NEoeB1L81k0YTdYKq1EJcngkH3SLRe2oBskGS2WwTjYhokAvIRi5JUqvRKKoSlFZkk1aMPW04H3Qn_eGtKBYoMIYNjvqdhnyCgpuluj4kWdHzJMxjzwptfClL2yFoSGEeAmUVCpQroiYHavYk0Z8lnsB9WSd6EsgTuw4OkCwCmEzwaTxxITLImlebGkeqzY8GCmG6Dtsw8z1sHiIskYmTB4WMmrD0x9mhVG61HEbmijrcJPjcpSDV78_vofj4XwyDsej6es1nORZISxcvIH6Lt3rWziSn7vlNr3LttUX22jB6w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+31st+International+Conference+on+Software+Engineering&rft.atitle=Modular+string-sensitive+permission+analysis+with+demand-driven+precision&rft.au=Geay%2C+E.&rft.au=Pistoia%2C+M.&rft.au=Tateishi%2C+T.&rft.au=Ryder%2C+B.G.&rft.date=2009-05-01&rft.pub=IEEE&rft.isbn=9781424434534&rft.issn=0270-5257&rft.spage=177&rft.epage=187&rft_id=info:doi/10.1109%2FICSE.2009.5070519&rft.externalDocID=5070519
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0270-5257&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0270-5257&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0270-5257&client=summon