Static check analysis for Java stack inspection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chang, Byeong-Mo | - |
dc.date.available | 2021-02-22T15:31:13Z | - |
dc.date.issued | 2006-03 | - |
dc.identifier.issn | 0362-1340 | - |
dc.identifier.uri | https://scholarworks.sookmyung.ac.kr/handle/2020.sw.sookmyung/15175 | - |
dc.description.abstract | Most static analysis techniques for optimizing stack inspection approximate permission sets such as granted permissions and denied permissions. Because they compute permission sets following control flow, they usually take intra-procedural control flow into consideration as well as call relationship. In this paper, we observed that it is necessary for more precise optimization on stack inspection to compute more specific information on checks instead of permissions. We propose a backward static analysis based on simple call graph to approximate redundant permission checks which must fail. In a similar way, we also propose a backward static analysis to approximate success permission checks, which must pass stack inspection. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | Static check analysis for Java stack inspection | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1145/1140543.1140550 | - |
dc.identifier.scopusid | 2-s2.0-33746041411 | - |
dc.identifier.wosid | 000238369000005 | - |
dc.identifier.bibliographicCitation | ACM SIGPLAN NOTICES, v.41, no.3, pp 40 - 48 | - |
dc.citation.title | ACM SIGPLAN NOTICES | - |
dc.citation.volume | 41 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 40 | - |
dc.citation.endPage | 48 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | java | - |
dc.subject.keywordAuthor | stack inspection | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | static analysis | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/1140543.1140550 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Sookmyung Women's University. Cheongpa-ro 47-gil 100 (Cheongpa-dong 2ga), Yongsan-gu, Seoul, 04310, Korea02-710-9127
Copyright©Sookmyung Women's University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.