CONCLUSION
This paper described an innovative approach to
provide protect host security against attack of malicious
mobile code by analyzing the Java bytecode.
This approach monitors the system access actions,
analyses information flow inside the mobile code and
checks if there is any violation that will destroy the
host integrity and confidentiality. A security model
for mobile code system is also proposed and a technique
named information dependence analysis and its
algorithm is described, by which the mobile code security
verification can be more flexible, extensible and
effective and the impairment on mobile code can be
avoided. Dependence analysis was studied in various
programming languages, and was mainly applied to
compiler optimizing, program slicing and various software
engineering tasks such as program debugging,
testing and maintenance in high-level languages. In
this paper, it is creatively introduced into Java bytecode
information flow study.