skip to main content
10.1145/1507504.1507507acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
research-article

Aspects and class-based security: a survey of interactions between advice weaving and the Java 2 security model

Authors Info & Claims
Published:21 October 2008Publication History

ABSTRACT

Various aspect-oriented languages, e.g., AspectJ, Aspect-Werkz, and JAsCo, have been proposed as extensions to one particular object-oriented base language, namely Java. But these extensions do not fully take the interactions with the Java 2 security model into account. In particular, the implementation technique of advice weaving gives rise to two security issues: the erroneous assignment of aspects to protection domains and the violation of namespace separation. Therefore, a comprehensive discussion of the design choices available with respect to interactions with the dynamic class loading facilities of the Java VM is provided.

References

  1. B. Alpern, C. R. Attanasio, A. Cocchi, D. Lieber, S. Smith, T. Ngo, J. J. Barton, S. F. Hummel, J. C. Sheperd, and M. Mergen. Implementing Jalapeño in Java. In Proceedings of the 14th Conference on Object-oriented Programming, Systems, Languages, and Applications, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. The AspectJ Project. The AspectJ Development Environment Guide. http://www.eclipse.org/aspectj/doc/released/devguide/.Google ScholarGoogle Scholar
  3. The AspectJ Project. The AspectJ Programming Guide. http://www.eclipse.org/aspectj/doc/released/progguide/.Google ScholarGoogle Scholar
  4. P. Avgustinov, A. S. Christensen, L. J. Hendren, S. Kuzins, J. Lhoták, O. Lhoták, O. de Moor, D. Sereni, G. Sittampalam, and J. Tibbie. Optimising AspectJ. ACM SIGPLAN Notices, 40(6), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. O. Barzilay, Y. A. Feldman, S. Tyszberowicz, and A. Yehudai. Call and execution semantics of AspectJ. In Proceedings of the 3rd Workshop on Foundations of Aspect-oriented Languages, 2004.Google ScholarGoogle Scholar
  6. C. Bockisch, M. Haupt, and M. Mezini. Dynamic virtual join point dispatch. In Proceedings of the 4th Workshop on Software Engineering Properties of Languages and Aspect Technologies, 2006.Google ScholarGoogle Scholar
  7. J. Bonér. AspectWerkz. In Proceedings of the 3rd Conference on Aspect-oriented Software Development, 2004.Google ScholarGoogle Scholar
  8. B. de Win, F. Piessens, and W. Joosen. How secure is AOP and what can we do about it? In Proceedings of the 2006 Workshop on Software Engineering for Secure Systems, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Gosling, W. N. Joy, G. L. Steele, and G. Bracha. The Java Language Specification. Addison-Wesley, 3rd edition, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Hilsdale and J. Hugunin. Advice weaving in AspectJ. In Proceedings of the 3rd Conference on Aspect-oriented Software Development (AOSD), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of AspectJ. In Proceedings of the 15th European Conference on Object-oriented Programming, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In Proceedings of the 11th European Conference on Object-oriented Programming, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Liang and G. Bracha. Dynamic class loading in the Java virtual machine. In Proceedings of the 13th Conference on Object-oriented Programming, Systems, Languages, and Applications, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Lindholm and F. Yellin. The Java Virtual Machine Specification. The Java Series. Prentice Hall, 2nd edition, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Masuhara and G. Kiczales. Modeling crosscutting in aspect-oriented mechanisms. In Proceedings of the 17th European Conference on Object-oriented Programming, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sun Microsystems. The Java HotSpot Server VM. http://java.sun.com/products/hotspot/docs/general/hs2.html.Google ScholarGoogle Scholar
  18. D. Suvée, W. Vanderperren, and V. Jonckers. JAsCo: an aspect-oriented approach tailored for component based software development. In Proceedings of the 2nd Conference on Aspect-oriented Software Development, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. System and Software Engineering Lab, Vrije Universiteit Brussel. JAsCo language reference 0.8.6. http://ssel.vub.ac.be/jasco/lib/exe/fetch.php?media=documentation%3Ajasco.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Aspects and class-based security: a survey of interactions between advice weaving and the Java 2 security model

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            VMIL '08: Proceedings of the 2nd Workshop on Virtual Machines and Intermediate Languages for emerging modularization mechanisms
            October 2008
            41 pages
            ISBN:9781605583846
            DOI:10.1145/1507504

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 October 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate4of4submissions,100%

            Upcoming Conference

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader