2004
DOI: 10.1007/s10207-004-0038-8
|View full text |Cite
|
Sign up to set email alerts
|

Stack inspection and secure program transformations

Abstract: The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR. We introduce a static analysis which safely approximates the set of access rights granted to code at run-time. This analysis provides us with the basis to reduce the run-time overhead of stack inspection, also in combination with other program transformations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2004
2004
2006
2006

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(20 citation statements)
references
References 27 publications
(39 reference statements)
0
20
0
Order By: Relevance
“…There have been several works to optimize stack inspection by eliminating redundant checks with static analysis information [4,12,1,2,10]. Most of them approximate permission sets such as granted permissions and denied permissions [4,12,1,2,10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been several works to optimize stack inspection by eliminating redundant checks with static analysis information [4,12,1,2,10]. Most of them approximate permission sets such as granted permissions and denied permissions [4,12,1,2,10].…”
Section: Introductionmentioning
confidence: 99%
“…Most of them approximate permission sets such as granted permissions and denied permissions [4,12,1,2,10]. Because they compute permission sets following control flow, they usually take intra-procedural control flow into consideration as well as call relationship [12,1,2].…”
Section: Introductionmentioning
confidence: 99%
“…Unlikely to [1,2], our static analysis is based on simple call graph. The May-Succeed Check Analysis computes checks which may succeed at the entry of each method, which are shown in Figure 3.…”
Section: Theorem 1 For Every Actual Normal Call Chain From a Methods mentioning
confidence: 99%
“…By invoking AccessController.doPrivileged(A), a method M performs a privileged action A; this involves invoking method A.run() with all the permissions of M enabled. This can be seen as marking the method frame of M as privileged: stack inspection will then stop as soon as a privileged frame (starting from the top) is found [2].…”
Section: Stack Inspectionmentioning
confidence: 99%
See 1 more Smart Citation