TCFI4J: A Trust Enhanced Control Flow Integrity in Java Virtual Machine

Article Preview

Abstract:

Along with the developing of information technology, Java platform a plays more and more important role in building enterprise information system. Especially after the cloud computing emerged, Java applications are used as kinds of services to provide the users some function. Users use these services remotely, and the applications should give the users some trust evidence. Control-flow integrity endows the software the ability to show the applications' behaviors conform to the users' expectations. But the Java virtual machine's memory organization is different from physical machine and hinders the application of CFI. This paper gives out the a novel way to enforce the control flow integrity to the Java applications based on the memory organization of the Java virtual machine. The method presented in this paper can provide the user information about an applications behavior, and significantly improve the security of a Java application.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1477-1484

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security, ACM, 2005, pp.340-353.

DOI: 10.1145/1102120.1102165

Google Scholar

[2] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, ACM Trans. Inf. Syst. Secur., ACM, vol. 4, 2009, pp.1-40.

DOI: 10.1145/1609956.1609960

Google Scholar

[3] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, A theory of secure control flow, Proceedings of the 7th international conference on Formal Methods and Software Engineering, Springer-Verlag, 2005, pp.111-124.

DOI: 10.1007/11576280_9

Google Scholar

[4] U. Erlingsson, S. Valley, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula, XFI: software guards for system address spaces, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, USENIX Association, (2006).

Google Scholar

[5] G. Morrisett, G. Tan, J. Tassarotti, J. B. Tristan, and E. Gan, RockSalt: better, faster, stronger SFI for the x86, Proceedings of the 33rd ACM SIGPLAN conference on Programming Language Design and Implementation, ACM, 2012, pp.395-404.

DOI: 10.1145/2254064.2254111

Google Scholar

[6] Z. Wang, and X. Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2010, pp.380-395.

DOI: 10.1109/sp.2010.30

Google Scholar

[7] N. Geoffray, G. Thomas, G. Muller, P. Parrend, S. Frénot, and B. Folliot, I-JVM: a Java Virtual Machine for Component Isolation in OSGi, Proceedings of International Conference on Dependable Systems and Networks (DSN 2009), IEEE Computer Society, (2009).

DOI: 10.1109/dsn.2009.5270296

Google Scholar

[8] G. Czajkowski, Application isolation in the Java Virtual Machine, Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, ACM, 2000, pp.354-366.

DOI: 10.1145/353171.353195

Google Scholar

[9] Trusted Computing Group, TPM Specification Version 1. 2 Revision 103, http: /www. trusted-computinggroup. org/resources/tpm_main_ specification.

Google Scholar