Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications - OOPSLA ' 2002
DOI: 10.1145/582450.582452
|View full text |Cite
|
Sign up to set email alerts
|

Access rights analysis for Java

Abstract: Java™ 2 has a security architecture that protects systems from unauthorized access by mobile or statically configured code. The problem is in manually determining the set of security access rights required to execute a library or application. The commonly used strategy is to execute the code, note authorization failures, allocate additional access rights, and test again. This process iterates until the code successfully runs for the test cases in hand. Test cases usually do not cover all paths through the code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 24 publications
(43 citation statements)
references
References 13 publications
0
43
0
Order By: Relevance
“…ACE performs minimization automatically by instantiating all the Permission objects detected, and by then executing the implies method of each Permission object against all the other Permission objects. If p and q are Permission objects required by p, and p.implies(q) returns true, then only p needs to be added to the policy for p. Unlike previous, unsafe policy-minimization approaches [20], ACE prevents potentially-malicious code embedded into implies methods from harming the system by executing implies only under the system SecurityManager.…”
Section: Dynamic Policy Minimizationmentioning
confidence: 99%
See 2 more Smart Citations
“…ACE performs minimization automatically by instantiating all the Permission objects detected, and by then executing the implies method of each Permission object against all the other Permission objects. If p and q are Permission objects required by p, and p.implies(q) returns true, then only p needs to be added to the policy for p. Unlike previous, unsafe policy-minimization approaches [20], ACE prevents potentially-malicious code embedded into implies methods from harming the system by executing implies only under the system SecurityManager.…”
Section: Dynamic Policy Minimizationmentioning
confidence: 99%
“…As such, they were considerably easier to attack than UNIX setuid programs because they lacked the usual separate process/separate address space protections, as shown by Koegel, et al [19]. Koved, et al [20] and Pistoia, et al [26] automate static security analysis for Java authorization and privilege assertion. Zhang, et al [37] enhance those works with an automated native-code model generator to reduce the number of false negatives.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Koved et al [11] presents a technique for computing the access rights requirements by using a context sensitive, flow sensitive, interprocedural data flow analysis. This analysis computes at each program point the set of access rights required by the code.…”
Section: Related Workmentioning
confidence: 99%
“…Most static analyses approximate stack inspection in terms of permissions [4,5,1,2,11]. Our proposed analysis is unique in that it compute success or fail information in terms of permission checks.…”
Section: Related Workmentioning
confidence: 99%