Secure execution of Java']Java applets using a remote playground

被引:12
|
作者
Malkhi, D [1 ]
Reiter, MK
机构
[1] Hebrew Univ Jerusalem, Inst Comp Sci, Jerusalem, Israel
[2] Bell Labs, Murray Hill, NJ 07974 USA
关键词
!text type='Java']Java[!/text; mobile code; security; remote method invocation;
D O I
10.1109/32.888632
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile code presents a number of threats to machines that execute ii. We introduce an approach for protecting machines and the resources they hold from mobile code and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the playground, at which it is executed. Prior to execution, the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets and discusses extensions of it for other forms of mobile code, including Java 1.2.
引用
收藏
页码:1197 / 1209
页数:13
相关论文
共 50 条
  • [1] Secure execution of Java']Java applets using a remote playground
    Malkhi, D
    Reiter, MK
    Rubin, AD
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 40 - 51
  • [2] Secure WWW transactions using standard HTTP and Java']Java applets
    Bergadano, F
    Crispo, B
    Eccettuato, M
    [J]. PROCEEDINGS OF THE 3RD USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1998, : 109 - 119
  • [3] Spout: A transparent proxy for safe execution of Java']Java applets
    Chiueh, TC
    Sankaran, H
    Neogi, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2002, 20 (07) : 1426 - 1433
  • [4] Secure JAVA']JAVA applets and applications: Guidelines and lessons learnt from the JAVA']JAVA security model
    Bichindaritz, I
    Siadak, MF
    Jocom, J
    Moinpour, C
    Donaldson, G
    Bush, N
    Chapko, M
    Sullivan, KM
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, : 1028 - 1028
  • [5] Java']Java applets in Ada
    Riehle, R
    [J]. JOURNAL OF OBJECT-ORIENTED PROGRAMMING, 1998, 11 (03): : 72 - 75
  • [6] Java']Java Remote Job Execution System
    Jiang, Shanliang
    Clements, Stuart
    [J]. CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 561 - 566
  • [7] Parasite: Distributing processing using Java']Java applets
    Suppi, R
    Solsona, M
    Luque, E
    [J]. EURO-PAR 2002 PARALLEL PROCESSING, PROCEEDINGS, 2002, 2400 : 598 - 602
  • [8] Animating formal specifications using Java']Java applets
    Lakos, C
    Lewis, G
    [J]. TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS (TOOLS 25) - PROCEEDINGS, 1998, : 196 - 209
  • [9] Blocking Java']Java applets at the firewall
    Martin, DM
    Rajagopalan, S
    Rubin, AD
    [J]. 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 16 - 26
  • [10] Web applets: Java']Java Java']JavaScript and ActiveX
    Stein, L
    [J]. TRENDS IN GENETICS, 1996, 12 (11) : 484 - 485