Java Mobile Code Security by Bytecode Behavior Analysis

G. Bian, K. Nakayama, Y. Kobayashi, and M. Maekawa (Japan)

Keywords

Mobile code security, bytecode, dependence analysis,information flow

Abstract

Java mobile code such as applets, mobile agents, can be transmitted and remotely executed automatically, but during the course the security of the host can not be fully guaranteed. Existing protection mechanisms tend to prevent the host from potential attacks by confining the mobile code, which may impair the function of the mobile code. To solve this problem, we propose a method to extend bytecode dependence analysis technique to information flow to analyze the Java mobile code security-relevant behavior prior to its execution, thus to ensure the two major security aspects of the host integrity and confidentiality without casting any restriction to Java mobile code. A prototype is under development. This tool will be used to analyze Java class files, applets and mobile agents.

Important Links:



Go Back


IASTED
Rotating Call For Paper Image