Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too m...
Uložené v:
| Vydané v: | 2009 IEEE 31st International Conference on Software Engineering s. 177 - 187 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
Washington, DC, USA
IEEE Computer Society
16.05.2009
IEEE |
| Edícia: | ACM Conferences |
| Predmet: | |
| ISBN: | 9781424434534, 142443453X |
| ISSN: | 0270-5257 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
|---|---|
| AbstractList | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
| Author | Geay, Emmanuel Takaaki Tateishi Ryder, Barbara G. Dolby, Julian Pistoia, Marco |
| Author_xml | – sequence: 1 givenname: Emmanuel surname: Geay fullname: Geay, Emmanuel organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 2 givenname: Marco surname: Pistoia fullname: Pistoia, Marco organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 3 surname: Takaaki Tateishi fullname: Takaaki Tateishi organization: IBM Tokyo Research Laboratory, Japan – sequence: 4 givenname: Barbara G. surname: Ryder fullname: Ryder, Barbara G. organization: Virginia Tech, Blacksburg, USA – sequence: 5 givenname: Julian surname: Dolby fullname: Dolby, Julian organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA |
| BookMark | eNqNkE9LAzEQxQMqWGs_gHjZs7B18s8kRylVCxUP6jlkk6xGu9mSrEq_vVla785lDr_3hnnvDB3HPnqELjDMMQZ1vVo8L-cEQM05COBYHaGZEhIzwhhlnLJjNAEioOaEi1M0y_kDyhSCpZqg1WPvvjYmVXlIIb7V2ccchvDtq61PXcg59LEy0Wx2OeTqJwzvlfOdia52qahitU3ehlF1jk5as8l-dthT9Hq3fFk81Oun-9Xidl0bwvFQ0xsGXCqjyrtENBw3jNtWNdxab4QVBjshKVdApHTWOemoaRhuXcttiQV0ii73d4P3Xm9T6Eza6UP4QmFPje100_efWWPQY1N6bEqPTf2JdZOCb4vl6t8W-gt5rWrV |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ICSE.2009.5070519 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 187 |
| ExternalDocumentID | 5070519 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IG 6IH 6IK 6IL 6IM 6IN AAJGR AARBI ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IERZE OCL RIE RIL RIO -~X .4S .DC 123 23M 29O 5VS 8US AAWTH ABLEC ADZIZ AFFNX ARCSS AVWKF CHZPO EDO FEDTE I-F I07 IEGSK IJVOP IPLJI M43 RNS XOL |
| ID | FETCH-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| IEDL.DBID | RIE |
| ISBN | 9781424434534 142443453X |
| ISICitedReferencesCount | 10 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0270-5257 |
| IngestDate | Wed Aug 27 02:03:50 EDT 2025 Wed Jan 31 06:38:21 EST 2024 Wed Jan 31 06:42:45 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| PageCount | 11 |
| ParticipantIDs | acm_books_10_1109_ICSE_2009_5070519_brief acm_books_10_1109_ICSE_2009_5070519 ieee_primary_5070519 |
| PublicationCentury | 2000 |
| PublicationDate | 20090516 2009-May |
| PublicationDateYYYYMMDD | 2009-05-16 2009-05-01 |
| PublicationDate_xml | – month: 05 year: 2009 text: 20090516 day: 16 |
| PublicationDecade | 2000 |
| PublicationPlace | Washington, DC, USA |
| PublicationPlace_xml | – name: Washington, DC, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2009 IEEE 31st International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2009 |
| Publisher | IEEE Computer Society IEEE |
| Publisher_xml | – name: IEEE Computer Society – name: IEEE |
| SSID | ssj0000453189 ssj0006499 |
| Score | 1.8121532 |
| Snippet | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 177 |
| SubjectTerms | Algorithm design and analysis Authorization General and reference -- Cross-computing tools and techniques -- Reliability Inspection Java Laboratories Permission Prototypes Runtime environment Security Software and its engineering -- Software notations and tools Software and its engineering -- Software organization and properties -- Extra-functional properties -- Software reliability Testing |
| Title | Modular string-sensitive permission analysis with demand-driven precision |
| URI | https://ieeexplore.ieee.org/document/5070519 |
| WOSCitedRecordID | wos000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH60xYOnqq1YNwb0Ijg2aZZJzqXFgpaCCr2FWaUH05K2_n7nJZOI4EFvWQYyPCZvf98HcGtweFJyQUc6iKj1_zlFkkI6Qqw4YW2iUCW6_hObz5PlMl204L6ZhdFal81n-gEvy1q-Wss9psqG1ndBj6MNbcbialaryadY18Qez7TRwnFYckfaqMujiPhZD3UFdt2yxnpy96Erd_peOpyNXyYVjKX7Gpot-fGDfKW0PdPu_3Z9BP3vIT6yaMzTMbR0fgLdmsWBuJ-6B7PntcJeVIIMHvk73WJLOypBssFGGeySzQl32CUE87ZE6Q-eK6oKVJVkUzienj68TSev40fqCBYot27NjgZxiKyCPLVbHDER-SKMpElFJKXmTDLuK0wMIcBLoqRSiQq4CH2jTCSt-LzgFDr5OtdnQBIWGBMJo5gMQqaYECaObCjlK-2lUowGcGOlmGHksM3KwMNLM5Q18mCmmZPRAO7-sCoTxUqbAfRQ1tmmQuWoX57__vgCDqs6ELYqXkJnV-z1FRzIz91qW1yXR-kL-cu-fQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bSwJBFD6YBfVkpZFdB-olaHKv7u6zKEoqQga-LXMNH1xl1X5_c_YWQQ_1tpeBHQ6z536-D-BR4_CkYJw6yvWp8f8ZRZJC6iBWHDc2kcsMXX8cTKfhYhHNavBczcIopbLmM_WCl1ktX67FHlNlHeO7oMdxAIe-5zlWPq1VZVSMc2IOaFTp4a6XsUeauMuiiPlZjnW5Zt2iRHsq7r2i4GlbUWfUe-vnQJbF99BwidUP-pXM-gwa_9v3KbS-x_jIrDJQZ1BTyTk0Sh4HUvzWTRhN1hK7UQlyeCQfdItN7agGyQZbZbBPNiGsQC8hmLklUq1YIqlMUVmSTVow9bTgfdCf94a0oFigzDg2O-p2PeQVZJHZohNw3-aeL3TEfSEUC0TAbImpIYR4CaWQMpQu456tpfaFEZ_lXkA9WSfqEkgYuFr7XMtAuF4gA8511zfBlC2VFQnutOHBSDHG2GEbZ6GHFcUoa2TCjOJCRm14-sOqmKdLpdvQRFnHmxyXo3x59fvjezgezifjeDyavl7DSV4VwsbFG6jv0r26hSPxuVtu07vsWH0BFofBxA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+31st+International+Conference+on+Software+Engineering&rft.atitle=Modular+string-sensitive+permission+analysis+with+demand-driven+precision&rft.au=Geay%2C+E.&rft.au=Pistoia%2C+M.&rft.au=Tateishi%2C+T.&rft.au=Ryder%2C+B.G.&rft.date=2009-05-01&rft.pub=IEEE&rft.isbn=9781424434534&rft.issn=0270-5257&rft.spage=177&rft.epage=187&rft_id=info:doi/10.1109%2FICSE.2009.5070519&rft.externalDocID=5070519 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0270-5257&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0270-5257&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0270-5257&client=summon |

