Automated analysis of Java methods for confidentiality

Cerny P, Alur R. 2009. Automated analysis of Java methods for confidentiality. 21st International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 5643, 173–187.

Download
No fulltext has been uploaded. References only!

Conference Paper | Published | English

Scopus indexed
Author
Cerny, PavolISTA; Alur, Rajeev
Series Title
LNCS
Abstract
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants to keep secret. Existing software model checking tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. We develop an automated analysis technique for such properties. We show that both over- and under- approximation is needed for sound analysis. Given a program and a confidentiality requirement, our technique produces a formula that is satisfiable if the requirement holds. We evaluate the approach by analyzing bytecode of a set of Java (J2ME) methods.
Publishing Year
Date Published
2009-07-01
Proceedings Title
21st International Conference on Computer Aided Verification
Publisher
Springer
Volume
5643
Page
173 - 187
Conference
CAV: Computer Aided Verification
IST-REx-ID

Cite this

Cerny P, Alur R. Automated analysis of Java methods for confidentiality. In: 21st International Conference on Computer Aided Verification. Vol 5643. Springer; 2009:173-187. doi:10.1007/978-3-642-02658-4_16
Cerny, P., & Alur, R. (2009). Automated analysis of Java methods for confidentiality. In 21st International Conference on Computer Aided Verification (Vol. 5643, pp. 173–187). Springer. https://doi.org/10.1007/978-3-642-02658-4_16
Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality.” In 21st International Conference on Computer Aided Verification, 5643:173–87. Springer, 2009. https://doi.org/10.1007/978-3-642-02658-4_16.
P. Cerny and R. Alur, “Automated analysis of Java methods for confidentiality,” in 21st International Conference on Computer Aided Verification, 2009, vol. 5643, pp. 173–187.
Cerny P, Alur R. 2009. Automated analysis of Java methods for confidentiality. 21st International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 5643, 173–187.
Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality.” 21st International Conference on Computer Aided Verification, vol. 5643, Springer, 2009, pp. 173–87, doi:10.1007/978-3-642-02658-4_16.

Export

Marked Publications

Open Data ISTA Research Explorer

Search this title in

Google Scholar