Embedding Verifiable Information Flow Analysis - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

Embedding Verifiable Information Flow Analysis

Résumé

Pervasive computing is the next generation of comput- ing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java byte- code adapted for applications dedicated to embedded sys- tems. Existing techniques are not well adapted to this do- main and are often too complex. To ease embedded oper- ations and reduce overhead, an external static analysis is performed initially, and the results are embedded as anno- tations within the code and certified at loading time. In con- trast with other analysis techniques, our model supports dy- namic class loading. We evaluated our model on a business case study involving an electronic wallet for air miles stor- age and management from the literature. We obtained the same results as the other papers but under more restrictive conditions related to inherent characteristics of embedded environments.
Fichier non déposé

Dates et versions

inria-00544957 , version 1 (09-12-2010)

Identifiants

  • HAL Id : inria-00544957 , version 1

Citer

Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl. Embedding Verifiable Information Flow Analysis. Proc. 4th Annual Conference on Privacy, Security and Trust, 2006, Toronto, Canada. pp.343--352. ⟨inria-00544957⟩
88 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More