skip to main content
10.1145/2898375.2898377acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

Abstract runtime structure for reasoning about security: poster

Published:19 April 2016Publication History

ABSTRACT

We propose an interactive approach where analysts reason about the security of a system using an abstraction of its runtime structure, as opposed to looking at the code. They interactively refine a hierarchical object graph, set security properties on abstract objects or edges, query the graph, and investigate the results by studying highlighted objects or edges or tracing to the code. Behind the scenes, an inference analysis and an extraction analysis maintain the soundness of the graph with respect to the code.

References

  1. M. Abi-Antoun and J. Aldrich. Static Extraction and Conformance Analysis of Hierarchical Runtime Architectural Structure using Annotations. In OOPSLA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Aldrich and C. Chambers. Ownership Domains: Separating Aliasing Policy from Mechanism. In ECOOP, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  3. F. Long, D. Mohindra, R. C. Seacord, D. F. Sutherland, and D. Svoboda. The CERT Oracle Secure Coding Standard for Java. Addison-Wesley, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. SEI CERT Oracle Coding Standard for Java, 2016. www.securecoding.cert.org/confluence/display/java/.Google ScholarGoogle Scholar
  5. R. Vanciu and M. Abi-Antoun. Finding architectural flaws using constraints. In ASE, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Abstract runtime structure for reasoning about security: poster

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      HotSos '16: Proceedings of the Symposium and Bootcamp on the Science of Security
      April 2016
      138 pages
      ISBN:9781450342773
      DOI:10.1145/2898375

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 April 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate34of60submissions,57%
    • Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader