Presentation 2000/9/22
A Security Verification Method for Programs with Stack Inspection
Satoshi Ikada, Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Java development kit 1.2 provides a runtime access control mechanism which inspects the control stack to check that the program has appropriate access permission. For such a programming language, it is desirable to guarantee that each execution of a program satisfies required security properties. Jensen et al. introduced a verification problem of deciding for a given program P and a given security property F written in a temporal logic formula, whether every reachable state of P satisfies F. They showed that the problem is decidable for the class of programs which do not contain mutual recursion. In this paper, it is shown that the set of state sequences (traces) of a program is always an indexed language and consequently the verification problem is decidable. Our result is stronger than Jensen's in that a security property can be specified as a regular language, whose expressive power is properly stronger than temporal logic, and a program can contain mutual recursion.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) access control / security verification / indexed language / stack inspection / Java
Paper # ISEC2000-78
Date of Issue

Conference Information
Committee ISEC
Conference Date 2000/9/22(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Security Verification Method for Programs with Stack Inspection
Sub Title (in English)
Keyword(1) access control
Keyword(2) security verification
Keyword(3) indexed language
Keyword(4) stack inspection
Keyword(5) Java
1st Author's Name Satoshi Ikada
1st Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology()
2nd Author's Name Naoya Nitta
2nd Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology
3rd Author's Name Yoshiaki Takata
3rd Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology
4th Author's Name Hiroyuki Seki
4th Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology
Date 2000/9/22
Paper # ISEC2000-78
Volume (vol) vol.100
Number (no) 324
Page pp.pp.-
#Pages 8
Date of Issue