Lightweight Modeling of Java Virtual Machine Security Constraints