Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too m...
Saved in:
| Published in: | 2009 IEEE 31st International Conference on Software Engineering pp. 177 - 187 |
|---|---|
| Main Authors: | , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Washington, DC, USA
IEEE Computer Society
16.05.2009
IEEE |
| Series: | ACM Conferences |
| Subjects: | |
| ISBN: | 9781424434534, 142443453X |
| ISSN: | 0270-5257 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
|---|---|
| AbstractList | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. What permissions should be granted to each component? Too few permissions may cause run-time authorization failures, too many constitute a security hole. We have designed and implemented a composite algorithm for precise static permission analysis for Java and the CLR. Unlike previous work, the analysis is modular and fully integrated with a novel slicing-based string analysis that is used to statically compute the string values defining a permission and disambiguate permission propagation paths. The results of our research prototype on production-level Java code support the effectiveness, practicality, and precision of our techniques, and show outstanding improvement over previous work. |
| Author | Geay, Emmanuel Takaaki Tateishi Ryder, Barbara G. Dolby, Julian Pistoia, Marco |
| Author_xml | – sequence: 1 givenname: Emmanuel surname: Geay fullname: Geay, Emmanuel organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 2 givenname: Marco surname: Pistoia fullname: Pistoia, Marco organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA – sequence: 3 surname: Takaaki Tateishi fullname: Takaaki Tateishi organization: IBM Tokyo Research Laboratory, Japan – sequence: 4 givenname: Barbara G. surname: Ryder fullname: Ryder, Barbara G. organization: Virginia Tech, Blacksburg, USA – sequence: 5 givenname: Julian surname: Dolby fullname: Dolby, Julian organization: IBM T. J. Watson Research Center, Hawthorne, NY, USA |
| BookMark | eNqNkE9LAzEQxQMqWGs_gHjZs7B18s8kRylVCxUP6jlkk6xGu9mSrEq_vVla785lDr_3hnnvDB3HPnqELjDMMQZ1vVo8L-cEQM05COBYHaGZEhIzwhhlnLJjNAEioOaEi1M0y_kDyhSCpZqg1WPvvjYmVXlIIb7V2ccchvDtq61PXcg59LEy0Wx2OeTqJwzvlfOdia52qahitU3ehlF1jk5as8l-dthT9Hq3fFk81Oun-9Xidl0bwvFQ0xsGXCqjyrtENBw3jNtWNdxab4QVBjshKVdApHTWOemoaRhuXcttiQV0ii73d4P3Xm9T6Eza6UP4QmFPje100_efWWPQY1N6bEqPTf2JdZOCb4vl6t8W-gt5rWrV |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ICSE.2009.5070519 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 187 |
| ExternalDocumentID | 5070519 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IG 6IH 6IK 6IL 6IM 6IN AAJGR AARBI ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IERZE OCL RIE RIL RIO -~X .4S .DC 123 23M 29O 5VS 8US AAWTH ABLEC ADZIZ AFFNX ARCSS AVWKF CHZPO EDO FEDTE I-F I07 IEGSK IJVOP IPLJI M43 RNS XOL |
| ID | FETCH-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| IEDL.DBID | RIE |
| ISBN | 9781424434534 142443453X |
| ISICitedReferencesCount | 10 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0270-5257 |
| IngestDate | Wed Aug 27 02:03:50 EDT 2025 Wed Jan 31 06:38:21 EST 2024 Wed Jan 31 06:42:45 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a251t-3640589a950727b51b45cf9b5ccea7c7a1d783590288dcdd8d3ab41fdf5c78103 |
| PageCount | 11 |
| ParticipantIDs | acm_books_10_1109_ICSE_2009_5070519_brief acm_books_10_1109_ICSE_2009_5070519 ieee_primary_5070519 |
| PublicationCentury | 2000 |
| PublicationDate | 20090516 2009-May |
| PublicationDateYYYYMMDD | 2009-05-16 2009-05-01 |
| PublicationDate_xml | – month: 05 year: 2009 text: 20090516 day: 16 |
| PublicationDecade | 2000 |
| PublicationPlace | Washington, DC, USA |
| PublicationPlace_xml | – name: Washington, DC, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2009 IEEE 31st International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2009 |
| Publisher | IEEE Computer Society IEEE |
| Publisher_xml | – name: IEEE Computer Society – name: IEEE |
| SSID | ssj0000453189 ssj0006499 |
| Score | 1.8121532 |
| Snippet | In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 177 |
| SubjectTerms | Algorithm design and analysis Authorization General and reference -- Cross-computing tools and techniques -- Reliability Inspection Java Laboratories Permission Prototypes Runtime environment Security Software and its engineering -- Software notations and tools Software and its engineering -- Software organization and properties -- Extra-functional properties -- Software reliability Testing |
| Title | Modular string-sensitive permission analysis with demand-driven precision |
| URI | https://ieeexplore.ieee.org/document/5070519 |
| WOSCitedRecordID | wos000271438200017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB7a4sFT1VasLxb0Irg2aXaT7Lm02IOloEJvYV-RHpqWtPX3u5OXCB70lmSXZBk2s_P8PoD7mI-MEOmIMqYi56DEPo1VyCjn2gjlB8bTsiCbiObzeLkUixY8Nr0w1tqi-Mw-4WWRyzcbfcBQ2dDZLmhxtKEdRWHZq9XEU5xp4ranaLRwyAruSOd1eRQRP-umrsDNW9ZYT9U9q9KdvieGs_HrpISxrL6Gx5Ze_yBfKc6eafd_qz6B_ncTH1k0x9MptGx2Bt2axYFUP3UPZi8bg7WoBBk8sg-6w5J2VIJki4UyWCWbEVlhlxCM2xJj1zIz1OSoKsk2r3h6-vA-nbyNn2lFsEClM2v2NAgZsgpK4ZY4ihT3FeM6FYprbWWkI-kbDAwhwEtstDGxCaRifmpSrp34vOAcOtkmsxdAtLTCOPvJ2XOSOS9IcsWEL-PYvX8USj2AOyfFBD2HXVI4Hp5IUNbIgymSSkYDePjDrETlK5sOoIeyTrYlKkc9ePn74ys4LvNAWKp4DZ19frA3cKQ_96tdfltspS_ROL3Y |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH7UKuipLhXrOqAXwbFZZpLMubS0WIugQm9htkgPTUva-vudl6YVwYPeksyQDI_Jm7d-H8BdwgMjRBZQxlTsHJTEp4mKGOVcG6H80HhalmQT8WiUjMfipQYP214Ya21ZfGYf8bLM5ZuZXmGorO1sF7Q4dmCXMxZ4626tbUTFGSdug4qtHo5YyR7p_C6PIubnpq0rdPPGG7Sn6p5VCU_fE-1B57W7BrKsvocHl57-oF8pT59e43_rPoTmdxsfedkeUEdQs_kxNDY8DqT6rU9g8DwzWI1KkMMj_6ALLGpHNUjmWCqDdbI5kRV6CcHILTF2KnNDTYHKksyLiqmnCe-97lunTyuKBSqdYbOkYcSQV1AKt8QgVtxXjOtMKK61lbGOpW8wNIQQL4nRxiQmlIr5mcm4duLzwlOo57PcngHR0grjLChn0Unm_CDJFRO-TBL3_iCSugW3Toop-g6LtHQ9PJGirJEJU6SVjFpw_4dZqSomNmvBCco6na9xOTaD578_voH9_tvzMB0ORk8XcLDOCmHh4iXUl8XKXsGe_lxOFsV1ua2-AOZ_wR8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+31st+International+Conference+on+Software+Engineering&rft.atitle=Modular+string-sensitive+permission+analysis+with+demand-driven+precision&rft.au=Geay%2C+Emmanuel&rft.au=Pistoia%2C+Marco&rft.au=Takaaki+Tateishi&rft.au=Ryder%2C+Barbara+G.&rft.series=ACM+Conferences&rft.date=2009-05-16&rft.pub=IEEE+Computer+Society&rft.isbn=9781424434534&rft.spage=177&rft.epage=187&rft_id=info:doi/10.1109%2FICSE.2009.5070519 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0270-5257&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0270-5257&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0270-5257&client=summon |

