SlideShare a Scribd company logo
Securing Class Initialization in Java-like Languages
ABSTRACT:
Language-based information-flow security is concerned with specifying and enforcing security
policies for information flow via language constructs. Although much progress has been made
on understanding information flow in object-oriented programs, little attention has been given
to the impact of class initialization on information flow. This paper turns the spotlight on
security implications of class initialization. We reveal the subtleties of information propagation
when classes are initialized, and demonstrate how these flows can be exploited to leak
information through error recovery. Our main contribution is a type-and-effect system which
tracks these information flows. The type system is parameterized by an arbitrary lattice of
security levels. Flows through the class hierarchy and dependencies in field initializers are
tracked by typing class initializers wherever they could be executed. The contexts in which each
class can be initialized are tracked to prevent insecure flows of out-of-scope contextual
information through class initialization statuses and error recovery. We show that the type
system enforces termination-insensitive noninterference.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Language-based concepts and techniques are becoming increasingly popular in the context of
security because they provide an appropriate level of abstraction for specifying and enforcing
application and language-sensitive security policies. Popular examples include: 1) Java stack
inspection, which enforces a stack-based access-control discipline, 2) Java byte code
verification, which traverses byte code to verify type safety, and 3) web languages such as Caja,
ADsafe and FBJS which use program transformation and language subsets to enforce
sandboxing and separation properties.
Language-based information-flow security is concerned with specifying and enforcing security
policies for information flow via language constructs. There has been much recent progress on
understanding information flow in languages of increasing complexity, and, consequently,
information-flow security tools for languages such as Java, ML, and Ada have emerged. In
particular, information flow in object-oriented languages has been an area of intensive
development. However, it is surprising that the impact of class initialization, being an important
aspect of object-oriented programs, has received scarce attention in the context of security.
DISADVANTAGES OF EXISTING SYSTEM:
Complexity is introduced by exceptions raised during initialization, as these can be
exploited to leak secret information.
The key issue is that class initialization may perform side effects (such as opening a file
or updating the memory). The side effects may be exploited by the attacker who may
deduce from these side effects which classes have (not) been initialized, which is
sometimes sufficient to learn secret information.
PROPOSED SYSTEM:
We propose a formalization that illustrates how to track information flow in presence of class
initialization by a type-and-effect system for a simple language. By ensuring that the
initialization (or success thereof) of a class containing public fields in no way depends on the
evaluation of an expression (or success thereof) containing secret data, the type-and-effect
system guarantees security in a form of noninterference. Informally, noninterference guarantees
that a program’s public outputs are independent of secret inputs. A key intricacy here is that of
class dependencies: An initialization of one class can cause the initialization of other classes.
The only approach we are aware of that actually considers class initialization in the context of
information-flow security is Jif
ADVANTAGES OF PROPOSED SYSTEM:
Jif’s restrictions on initialization code are rather severe: only simple constant manipulations,
which cannot raise exceptions, are allowed. Our treatment of class initialization is more liberal
than Jif’s and yet we demonstrate that it is secure. We argue that this liberty is desirable in
scenarios such as server-side code.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Willard Rafnsson, Keiko Nakata, and Andrei Sabelfeld-“Securing Class Initialization in Java-
like Languages”-IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 10, NO. 1, JANUARY/FEBRUARY 2013

More Related Content

DOCX
Securing class initialization in java like languages
DOCX
Security+
PDF
Frank Migge It Security Patch Monitoring With Nagios 02
DOC
Analysis of field data on web security vulnerabilities
PPT
Secure Software
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PDF
Web App Sec Benchmarks
PDF
Penetration testing tools and phases
Securing class initialization in java like languages
Security+
Frank Migge It Security Patch Monitoring With Nagios 02
Analysis of field data on web security vulnerabilities
Secure Software
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Web App Sec Benchmarks
Penetration testing tools and phases

What's hot (6)

PPT
PDF
cyber security career guide.pdf
PPT
Network virus detection & prevention
PDF
Become a Penetration Tester
PDF
An analysis of how antivirus methodologies are utilized in protecting compute...
PPTX
A comparative analysis of current intrusion detection technologies
cyber security career guide.pdf
Network virus detection & prevention
Become a Penetration Tester
An analysis of how antivirus methodologies are utilized in protecting compute...
A comparative analysis of current intrusion detection technologies
Ad

Viewers also liked (6)

DOCX
Comparable entity mining from comparative questions
DOCX
Privacy preserving delegated access control in public clouds
PDF
2013 2014 ieee finalyear btech mtech dotnet projects richbraintechnologies
PDF
2012 2013 ieee finalyear btech mtech java projects richbraintechnologies
DOCX
A stochastic model to investigate data center performance and qo s in iaas cl...
DOCX
Fast nearest neighbor search with keywords
Comparable entity mining from comparative questions
Privacy preserving delegated access control in public clouds
2013 2014 ieee finalyear btech mtech dotnet projects richbraintechnologies
2012 2013 ieee finalyear btech mtech java projects richbraintechnologies
A stochastic model to investigate data center performance and qo s in iaas cl...
Fast nearest neighbor search with keywords
Ad

Similar to Securing class initialization in java like languages (20)

PPT
Secure programming - Computer and Network Security
PDF
A Typed Assembly Language for Non-interference.pdf
PDF
The Science Of Quantitative Information Flow Mário S. Alvim
ODP
Tollas Ferenc - Java security
DOCX
Bsdtw17: theo de raadt: mitigations and other real security features
PDF
Proyecto de ingles
PPTX
Application and Website Security -- Designer Edition: Using Formal Specificat...
PPTX
Safe and Reliable Embedded Linux Programming: How to Get There
PDF
Modern Compiler Implementation In Java Second Edition 2nd Andrew W Appel
PPT
Week 13, Protection and Security.ppt
PDF
Secure Computing With Java
PDF
Advanced Java
PPT
운영체제론 Ch19
PDF
IRJET - Buffer Overflows Attacks & Defense
PDF
Java Platform Security Architecture
PPT
java-card20232024999999999999999999999999999999999999999999999999999999999999...
PDF
Sans signature buffer overflow blocker
PDF
11.sans signature buffer overflow blocker
PPT
Chapter 09
Secure programming - Computer and Network Security
A Typed Assembly Language for Non-interference.pdf
The Science Of Quantitative Information Flow Mário S. Alvim
Tollas Ferenc - Java security
Bsdtw17: theo de raadt: mitigations and other real security features
Proyecto de ingles
Application and Website Security -- Designer Edition: Using Formal Specificat...
Safe and Reliable Embedded Linux Programming: How to Get There
Modern Compiler Implementation In Java Second Edition 2nd Andrew W Appel
Week 13, Protection and Security.ppt
Secure Computing With Java
Advanced Java
운영체제론 Ch19
IRJET - Buffer Overflows Attacks & Defense
Java Platform Security Architecture
java-card20232024999999999999999999999999999999999999999999999999999999999999...
Sans signature buffer overflow blocker
11.sans signature buffer overflow blocker
Chapter 09

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.

Securing class initialization in java like languages

  • 1. Securing Class Initialization in Java-like Languages ABSTRACT: Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progress has been made on understanding information flow in object-oriented programs, little attention has been given to the impact of class initialization on information flow. This paper turns the spotlight on security implications of class initialization. We reveal the subtleties of information propagation when classes are initialized, and demonstrate how these flows can be exploited to leak information through error recovery. Our main contribution is a type-and-effect system which tracks these information flows. The type system is parameterized by an arbitrary lattice of security levels. Flows through the class hierarchy and dependencies in field initializers are tracked by typing class initializers wherever they could be executed. The contexts in which each class can be initialized are tracked to prevent insecure flows of out-of-scope contextual information through class initialization statuses and error recovery. We show that the type system enforces termination-insensitive noninterference. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Language-based concepts and techniques are becoming increasingly popular in the context of security because they provide an appropriate level of abstraction for specifying and enforcing application and language-sensitive security policies. Popular examples include: 1) Java stack inspection, which enforces a stack-based access-control discipline, 2) Java byte code verification, which traverses byte code to verify type safety, and 3) web languages such as Caja, ADsafe and FBJS which use program transformation and language subsets to enforce sandboxing and separation properties. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. There has been much recent progress on understanding information flow in languages of increasing complexity, and, consequently, information-flow security tools for languages such as Java, ML, and Ada have emerged. In particular, information flow in object-oriented languages has been an area of intensive development. However, it is surprising that the impact of class initialization, being an important aspect of object-oriented programs, has received scarce attention in the context of security. DISADVANTAGES OF EXISTING SYSTEM: Complexity is introduced by exceptions raised during initialization, as these can be exploited to leak secret information. The key issue is that class initialization may perform side effects (such as opening a file or updating the memory). The side effects may be exploited by the attacker who may deduce from these side effects which classes have (not) been initialized, which is sometimes sufficient to learn secret information.
  • 3. PROPOSED SYSTEM: We propose a formalization that illustrates how to track information flow in presence of class initialization by a type-and-effect system for a simple language. By ensuring that the initialization (or success thereof) of a class containing public fields in no way depends on the evaluation of an expression (or success thereof) containing secret data, the type-and-effect system guarantees security in a form of noninterference. Informally, noninterference guarantees that a program’s public outputs are independent of secret inputs. A key intricacy here is that of class dependencies: An initialization of one class can cause the initialization of other classes. The only approach we are aware of that actually considers class initialization in the context of information-flow security is Jif ADVANTAGES OF PROPOSED SYSTEM: Jif’s restrictions on initialization code are rather severe: only simple constant manipulations, which cannot raise exceptions, are allowed. Our treatment of class initialization is more liberal than Jif’s and yet we demonstrate that it is secure. We argue that this liberty is desirable in scenarios such as server-side code. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Willard Rafnsson, Keiko Nakata, and Andrei Sabelfeld-“Securing Class Initialization in Java- like Languages”-IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 1, JANUARY/FEBRUARY 2013