TY - GEN
T1 - Deriving an information flow checker and certifying compiler for java
AU - Barthe, Gilles
AU - Naumann, David
AU - Rezk, Tamara
PY - 2006
Y1 - 2006
N2 - Language-based security provides a means to enforce end-to-end confidentiality and integrity policies in mobile code scenarios, and is increasingly being contemplated by the smart-card and mobile phone industry as a solution to enforce information flow and resource control policies. Two threads of work have emerged in research on language-based security: work that focuses on enforcing security policies for source code, which is tailored towards developers that want to increase confidence in their applications, and work that focuses on efficiently verifying similar policies for byte-code, which is tailored to code consumers that want to protect themselves against hostile applications. These lines of work serve different purposes - and thus have been developed independently - but connecting them is a key step towards the deployment of language-based security in practical applications. This paper introduces a systematic technique to connect source code and bytecode security type systems. The technique is applied to an information flow type system for a fragment of Java with exceptions, thus confronting challenges in both control and data flow tracking.
AB - Language-based security provides a means to enforce end-to-end confidentiality and integrity policies in mobile code scenarios, and is increasingly being contemplated by the smart-card and mobile phone industry as a solution to enforce information flow and resource control policies. Two threads of work have emerged in research on language-based security: work that focuses on enforcing security policies for source code, which is tailored towards developers that want to increase confidence in their applications, and work that focuses on efficiently verifying similar policies for byte-code, which is tailored to code consumers that want to protect themselves against hostile applications. These lines of work serve different purposes - and thus have been developed independently - but connecting them is a key step towards the deployment of language-based security in practical applications. This paper introduces a systematic technique to connect source code and bytecode security type systems. The technique is applied to an information flow type system for a fragment of Java with exceptions, thus confronting challenges in both control and data flow tracking.
UR - http://www.scopus.com/inward/record.url?scp=33751034907&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751034907&partnerID=8YFLogxK
U2 - 10.1109/SP.2006.13
DO - 10.1109/SP.2006.13
M3 - Conference contribution
AN - SCOPUS:33751034907
SN - 0769525741
SN - 9780769525747
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 230
EP - 242
BT - Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
T2 - 2006 IEEE Symposium on Security and Privacy, S and P 2006
Y2 - 21 May 2006 through 24 May 2006
ER -