Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI).

Jason Howarth, Irfan Altas, Barney Dalgarno

Research output: Book chapter/Published conference paperConference paperpeer-review

2 Citations (Scopus)


Early attempts at preserving confidentiality in a computer system which monitors information leakage in single-threaded system relied on the use of an access control matrix to Java programs. Our implementation uses the Java Virtual identify the access rights an individual (or subject) had over Machine Tool Interface (JVMTI) and adapts the algorithms of a particular resource. But there is a problem with this Le Guernic et al. [1] for this purpose. We also offer a generic approach. The access rights that appear in the matrix only rule set for enforcing IFC. One advantage of our approach is control initial access to the resource. Once the resource is that it is dynamic, so that we are only concerned with the released from its access container there are no restrictions on security of the current execution of a program, not all possible its use. The mandatory access control (MAC) model was executions. Our system tracks flow at the level of primitive designed to prevent this type of abuse by removing the Java fields, allowing precise control over the information that ability of an arbitrary user to pass on permissions from the is monitored. Further, no modifications to the Java Virtual Machine (JVM) are needed for our system to work.
Original languageEnglish
Title of host publicationIEEE International Conference on Availability, Reliability and Security (AReS)
Place of PublicationUSA
Number of pages7
ISBN (Electronic)9781424458790
Publication statusPublished - 2010
EventARES 2010: The International Dependability Conference - Krakow, Poland, Poland
Duration: 15 Feb 201018 Feb 2010


ConferenceARES 2010: The International Dependability Conference


Dive into the research topics of 'Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI).'. Together they form a unique fingerprint.

Cite this