JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Year: 2009 Journal:   Journal of Computer Science Vol: 5 (2)Pages: 163-171   Publisher: Science Publications

Abstract

<b>Problem statement:</b> How a host (the code consumer) can determine with certainty that a downloaded program received from untrusted source (the code producer) will maintain the confidentiality of the data it manipulates and it is safe to install and execute. <b>Approach:</b> The approach adopted for verifying that a downloaded program will not leak confidential data to unauthorized parties was based on the concept of Proof-Carrying Code (PCC). A mobile program (in its assembly form) was analyzed for information flow security based on the concept of proof-carrying code. The security policy was centered on a type system for analyzing information flows within assembly programs based on the notion of noninterference. <b> Results:</b> A verification tool for verifying assembly programs for information flow security was built. The tool certifies SPARC assembly programs for secure information flow by statically analyzing the program based on the idea of Proof-Carrying Code (PCC). The tool operated directly on the machine-code requiring only the inputs and outputs of the code annotated with security levels. The tool provided a windows user interface enabling the users to control the verification process. The proofs that untrusted program did not leak sensitive information were generated and checked on the host machine and if they are valid, then the untrusted program can be installed and executed safely. <b>Conclusion:</b> By basing proof-carrying code infrastructure on information flow analysis type-system, a sufficient assurance of protecting confidential data manipulated by the mobile program can be obtained. This assurance was come due to the fact that type systems provide a sufficient guarantee of protecting confidentiality.

Keywords:
Computer science Confidentiality Code (set theory) Information flow Computer security Interface (matter) Process (computing) Source code Mathematical proof Programming language Host (biology) Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
25
Refs
0.09
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Journal:   Greater South Information System Year: 2009
JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Mahmod

Journal:   Journal of Computer Science Year: 2009 Vol: 5 (2)Pages: 163-171
JOURNAL ARTICLE

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Muthana

Journal:   Greater South Information System Year: 2009
JOURNAL ARTICLE

An abstract semantics tool for secure information flow of stack-based assembly programs

Cinzia BernardeschiN. De FrancescoGiuseppe Lettieri

Journal:   Microprocessors and Microsystems Year: 2002 Vol: 26 (8)Pages: 391-398
© 2026 ScienceGate Book Chapters — All rights reserved.