Abstract
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature should not just certify the origin of the code but rather bind together the code with a contract. We provide a description of the overall life-cycle of mobile code in the setting of security-by-contract, describe a tentative structure for a contractual language and propose a number of algorithms for one of the key steps in the process, the contract-policy matching issue. We argue that security-by-contract would provide a semantics for digital signatures on mobile code thus being a step in the transition from trusted code to trustworthy code.
Research partly supported by the project EU-IST-STREP-S3MS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Building bug-free O-O software: An introduction to Design by Contract(TM). Availabe at http://archive.eiffel.com/doc/manuals/technology/contract/
Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2000)
Dill, D.L., Hu, A.J., Wong-Toi, H.: Checking for Language Inclusion Using Simulation Relations. In: Larsen, K.G., Skou, A. (eds.) CAV 1991. LNCS, vol. 575, pp. 329–341. Springer, Heidelberg (1992)
Etessami, K.: A hierarchy of polynomial-time computable simulations for automata. In: Brim, L., Jančar, P., Křetínský, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol. 2421, pp. 131–144. Springer, Heidelberg (2002)
Etessami, K., Wilke, T., Schuller, R.: Fair Simulation Relations, Parity Games, and State Space Reduction for Buchi Automata. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 694–707. Springer, Heidelberg (2001)
Gong, L.: Java Security: Present and Near Future. IEEE Micro 17(3), 14–19 (1997)
Gong, L., Ellison, G.: Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation. Pearson Education (2003)
Havelund, K., Rosu, G.: Efficient monitoring of safety properties. Software Tools for Tech. Transfer (2004)
Henzinger, T., Kupferman, O., Rajamani, S.: Fair Simulation. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol. 1243, pp. 273–287. Springer, Heidelberg (1997)
Jurdzinski, M.: Small Progress Measures for Solving Parity Games. In: Reichel, H., Tison, S. (eds.) STACS 2000. LNCS, vol. 1770, pp. 290–301. Springer, Heidelberg (2000)
Kesten, Y., Manna, Z., McGuire, H., Pnueli, A.: A decision algorithm for full propositional temporal logic. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol. 697, pp. 97–109. Springer, Heidelberg (1993)
Michener, J.R., Acar, T.: Managing System and Active-Content Integrity. IEEE Computer 33(7), 108–110 (2000)
Moses, T.: eXtensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS (2003)
Necula, G.C.: Proof-Carrying Code. In: POPL 1997: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, New York, NY, USA, 1997, pp. 106–119. ACM Press, New York (1997)
Necula, G.C., Lee, P.: The Design and Implementation of a Certifying Compiler. SIGPLAN Not. 39(4), 612–625 (2004)
Sekar, R., Ramakrishnan, C.R., Ramakrishnan, I.V., Smolka, S.A.: Model-Carrying Code (MCC): a New Paradigm for Mobile-Code Security. In: NSPW 2001: Proceedings of the 2001 Workshop on New security paradigms, New York, NY, USA, 2001, pp. 23–30. ACM Press, New York (2001)
Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-Carrying Code: a Practical Approach for Safe Execution of Untrusted Applications. ACM SIGOPS Operating Systems Review 37(5), 15–28 (2003)
Le Sommer, N.: Towards Dynamic Resource Contractualisation for Software Components. In: Emmerich, W., Wolf, A.L. (eds.) CD 2004. LNCS, vol. 3083, pp. 129–143. Springer, Heidelberg (2004)
Wallach, D.S., Felten, E.W.: Understanding Java Stack Inspection. In: IEEE Symposium on Security and Privacy (1998)
Zobel, A., Simoni, C., Piazza, D., Nuez, X., Rodriguez, D.: Business case and security requirements. Public Deliverable D5.1.1, EU Project S3MS (October 2006), Report available at http://www.s3ms.org
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I. (2007). Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-73408-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73407-9
Online ISBN: 978-3-540-73408-6
eBook Packages: Computer ScienceComputer Science (R0)