2012
DOI: 10.1007/978-3-642-28756-5_10
|View full text |Cite
|
Sign up to set email alerts
|

Aspect-Oriented Runtime Monitor Certification

Abstract: Abstract. In-lining runtime monitors into untrusted binary programs via aspect-weaving is an increasingly popular technique for efficiently and flexibly securing untrusted mobile code. However, the complexity of the monitor implementation and in-lining process in these frameworks can lead to vulnerabilities and low assurance for code-consumers. This paper presents a machine-verification technique for aspect-oriented inlined reference monitors based on abstract interpretation and modelchecking. Rather than rely… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 32 publications
0
14
0
Order By: Relevance
“…AOP allows such implementations to be consolidated as aspects, which consist of (1) pointcuts-expressions that identify join points (sites throughout the rest of the code) that are relevant to the cross-cutting concern-and (2) advice consisting of code that modifies each join point to implement the concern. Prior work has recognized that such aspects are an elegant means of expressing RMs [16]- [20]. In such contexts, the pointcuts identify security-relevant program operations, and the advice introduces guard code that secures each such operation.…”
Section: B Aspect-oriented Programmingmentioning
confidence: 99%
“…AOP allows such implementations to be consolidated as aspects, which consist of (1) pointcuts-expressions that identify join points (sites throughout the rest of the code) that are relevant to the cross-cutting concern-and (2) advice consisting of code that modifies each join point to implement the concern. Prior work has recognized that such aspects are an elegant means of expressing RMs [16]- [20]. In such contexts, the pointcuts identify security-relevant program operations, and the advice introduces guard code that secures each such operation.…”
Section: B Aspect-oriented Programmingmentioning
confidence: 99%
“…Though its bytecode language is type-safe, past malware has exploited VM buffer overflows [37], implemented cross-site-scripting attacks, and performed click-jacking [38,39] to damage browsers or disrupt victim host pages. The difficulty of enforcing rich AS security policies that prevent such attacks in web environments that are aggressively heterogeneous (e.g., composed of mash-ups that mix mobile code from many mutually distrusting sources) has led to application of IRM technologies to this challenging problem domain [9,[25][26][27][28]40].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Its certifier performs a static analysis that verifies that contract-specified guard code appears at each security-relevant code point. Our past work presents model-checking as an efficient approach for verifying such IRMs without trusted guard code [26,27].…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations