Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too m...
Saved in:
| Published in: | 2009 IEEE 31st International Conference on Software Engineering pp. 177 - 187 |
|---|---|
| Main Authors: | , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Washington, DC, USA
IEEE Computer Society
16.05.2009
IEEE |
| Series: | ACM Conferences |
| Subjects: | |
| ISBN: | 9781424434534, 142443453X |
| ISSN: | 0270-5257 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
|---|---|
| AbstractList | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
| Author | Geay, Emmanuel Takaaki Tateishi Ryder, Barbara G. Dolby, Julian Pistoia, Marco |
| Author_xml | – sequence: 1 givenname: Emmanuel surname: Geay fullname: Geay, Emmanuel organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 2 givenname: Marco surname: Pistoia fullname: Pistoia, Marco organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 3 surname: Takaaki Tateishi fullname: Takaaki Tateishi organization: IBM Tokyo Research Laboratory, Japan – sequence: 4 givenname: Barbara G. surname: Ryder fullname: Ryder, Barbara G. organization: Virginia Tech, Blacksburg, USA – sequence: 5 givenname: Julian surname: Dolby fullname: Dolby, Julian organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA |
| BookMark | eNqNkE9LAzEQxQMqWGs_gHjZs7B18s8kRylVCxUP6jlkk6xGu9mSrEq_vVla785lDr_3hnnvDB3HPnqELjDMMQZ1vVo8L-cEQM05COBYHaGZEhIzwhhlnLJjNAEioOaEi1M0y_kDyhSCpZqg1WPvvjYmVXlIIb7V2ccchvDtq61PXcg59LEy0Wx2OeTqJwzvlfOdia52qahitU3ehlF1jk5as8l-dthT9Hq3fFk81Oun-9Xidl0bwvFQ0xsGXCqjyrtENBw3jNtWNdxab4QVBjshKVdApHTWOemoaRhuXcttiQV0ii73d4P3Xm9T6Eza6UP4QmFPje100_efWWPQY1N6bEqPTf2JdZOCb4vl6t8W-gt5rWrV |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ICSE.2009.5070519 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 187 |
| ExternalDocumentID | 5070519 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IG 6IH 6IK 6IL 6IM 6IN AAJGR AARBI ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IERZE OCL RIE RIL RIO -~X .4S .DC 123 23M 29O 5VS 8US AAWTH ABLEC ADZIZ AFFNX ARCSS AVWKF CHZPO EDO FEDTE I-F I07 IEGSK IJVOP IPLJI M43 RNS XOL |
| ID | FETCH-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| IEDL.DBID | RIE |
| ISBN | 9781424434534 142443453X |
| ISICitedReferencesCount | 10 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0270-5257 |
| IngestDate | Wed Aug 27 02:03:50 EDT 2025 Wed Jan 31 06:38:21 EST 2024 Wed Jan 31 06:42:45 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| PageCount | 11 |
| ParticipantIDs | acm_books_10_1109_ICSE_2009_5070519_brief acm_books_10_1109_ICSE_2009_5070519 ieee_primary_5070519 |
| PublicationCentury | 2000 |
| PublicationDate | 20090516 2009-May |
| PublicationDateYYYYMMDD | 2009-05-16 2009-05-01 |
| PublicationDate_xml | – month: 05 year: 2009 text: 20090516 day: 16 |
| PublicationDecade | 2000 |
| PublicationPlace | Washington, DC, USA |
| PublicationPlace_xml | – name: Washington, DC, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2009 IEEE 31st International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2009 |
| Publisher | IEEE Computer Society IEEE |
| Publisher_xml | – name: IEEE Computer Society – name: IEEE |
| SSID | ssj0000453189 ssj0006499 |
| Score | 1.8120534 |
| Snippet | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 177 |
| SubjectTerms | Algorithm design and analysis Authorization General and reference -- Cross-computing tools and techniques -- Reliability Inspection Java Laboratories Permission Prototypes Runtime environment Security Software and its engineering -- Software notations and tools Software and its engineering -- Software organization and properties -- Extra-functional properties -- Software reliability Testing |
| Title | Modular string-sensitive permission analysis with demand-driven precision |
| URI | https://ieeexplore.ieee.org/document/5070519 |
| WOSCitedRecordID | wos000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH60xYOnqq1YNwb0Ijg2y2SZc2mxB0tBhd7CbJEempa09fc7L5lUBA96SzJDMjwmb976fQD3XMQR08ajOTfWQQkCTaXxcpqkSlmd6etQ6opsIpnN0sWCz1vweOiFMcZUxWfmCS-rXL5eqz2GyobWdkGLow3tJInrXq1DPMWaJnZ78oMWjlnFHWm9Lo8i4mfT1BXaeYsG68ndM5fu9D0-nI5exzWMpfsaHltq9YN8pTp7Jt3_rfoE-t9NfGR-OJ5OoWWKM-g2LA7E_dQ9mL6sNdaiEmTwKD7oFkvaUQmSDRbKYJVsQYTDLiEYtyXarEShqS5RVZJN6Xh6-vA-Gb-NnqkjWKDCmjU7GsYMWQUFt0sMEhn5kkUq5zJSyohEJcLXGBhCgJdUK61THQrJ_FznkbLi88Jz6BTrwlwACfIgMClCVQifCaasHyZCJpV9sWd4rgdwZ6WYoeewzSrHw-MZyhp5MHnmZDSAhz_MymS5NPkAeijrbFOjcjSDl78_voLjOg-EpYrX0NmVe3MDR-pzt9yWt9VW-gK7Kb6k |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bT8IwFD5BNNEnVDDitYm-mFjZpWPrM4FABEIiJrwtXdsZHhhkgL_fnt2MiQ_6tq3N1px0p-f6fQCPXHQ9prRFY66Ng-I4ikbaiqkfSGl0pq3cSGVkE_50GiwWfFaD56oXRmudFZ_pF7zMcvlqLfcYKusY2wUtjgM49BhzrLxbq4qoGOPEbFBe6eEuy9gjjd9lUcT8LNu6XDNvUaI9FfesSHjaFu-Mem_9HMiy-B4eXHL1g34lO30Gjf-t-xRa3218ZFYdUGdQ08k5NEoeB1L81k0YTdYKq1EJcngkH3SLRe2oBskGS2WwTjYhokAvIRi5JUqvRKKoSlFZkk1aMPW04H3Qn_eGtKBYoMIYNjvqdhnyCgpuluj4kWdHzJMxjzwptfClL2yFoSGEeAmUVCpQroiYHavYk0Z8lnsB9WSd6EsgTuw4OkCwCmEzwaTxxITLImlebGkeqzY8GCmG6Dtsw8z1sHiIskYmTB4WMmrD0x9mhVG61HEbmijrcJPjcpSDV78_vofj4XwyDsej6es1nORZISxcvIH6Lt3rWziSn7vlNr3LttUX22jB6w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+31st+International+Conference+on+Software+Engineering&rft.atitle=Modular+string-sensitive+permission+analysis+with+demand-driven+precision&rft.au=Geay%2C+E.&rft.au=Pistoia%2C+M.&rft.au=Tateishi%2C+T.&rft.au=Ryder%2C+B.G.&rft.date=2009-05-01&rft.pub=IEEE&rft.isbn=9781424434534&rft.issn=0270-5257&rft.spage=177&rft.epage=187&rft_id=info:doi/10.1109%2FICSE.2009.5070519&rft.externalDocID=5070519 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0270-5257&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0270-5257&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0270-5257&client=summon |

