作者: Philip Fong , Simon Orr
DOI: 10.1109/ACSAC.2006.7
关键词: Application software 、 Computer science 、 Java 、 Isolation (database systems) 、 Software 、 Visibility (geometry) 、 Component-based software engineering 、 Address space 、 Operating system 、 Software system
摘要: With the recent advent of dynamically extensible software systems, in which extensions may be loaded into address space a core application to augment its capabilities, there is growing interest protection mechanisms that can isolate untrusted components from host application. Existing language-based environments such as JVM and CLI achieves isolation by an interposition mechanism known stack inspection. Expressive it is, inspection lack declarative characterization brittle face evolving configurations. A run-time module system, ISOMOD, proposed for Java platform facilitate isolation. create namespaces impose arbitrary name visibility policies control whether visible, whom what way accessed. Because ISOMOD exercises at load time, code runs full speed. Furthermore, because access are maintained separately, they evolve independently code. In addition, policy language provides means expressing very general form constraints. Not only simulate sizable subset permissions 2 security architecture, does so with robust changes The also expressive enough completely encode capability type system Discretionary Capability Confinement. spite expressiveness, admits efficient implementation strategy. short, avoids technical difficulties trading off acceptable level expressiveness. Name style therefore lightweight alternative interposition.