Secure execution of Java']Java applets using a remote playground

被引:12
|
作者
Malkhi, D [1 ]
Reiter, MK
机构
[1] Hebrew Univ Jerusalem, Inst Comp Sci, Jerusalem, Israel
[2] Bell Labs, Murray Hill, NJ 07974 USA
关键词
!text type='Java']Java[!/text; mobile code; security; remote method invocation;
D O I
10.1109/32.888632
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile code presents a number of threats to machines that execute ii. We introduce an approach for protecting machines and the resources they hold from mobile code and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the playground, at which it is executed. Prior to execution, the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets and discusses extensions of it for other forms of mobile code, including Java 1.2.
引用
收藏
页码:1197 / 1209
页数:13
相关论文
共 50 条
  • [21] Applications of Java']Java applets in electromagnetic simulation
    Fan, Y
    Li, EP
    Li, YL
    Li, LW
    [J]. APACE: 2003 ASIA-PACIFIC CONFERENCE ON APPLIED ELECTROMAGNETICS, PROCEEDINGS, 2003, : 132 - 136
  • [22] Chemistry visualization using Java']Java applets and HTML']HTML.
    Walden, SE
    Estrada, CN
    Horie, T
    Molinaro, M
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1998, 216 : U691 - U691
  • [23] Reverse engineering Java']Java card applets using power analysis
    Vermoen, Dennis
    Witteman, Marc
    Gaydadjiev, Georgi N.
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 138 - +
  • [24] Educational Java']Java applets for MOS capacitor
    Saharil, F
    Hasbi, AM
    Hussin, H
    [J]. 2004 IEEE International Conference on Semiconductor Electronics, Proceedings, 2004, : 627 - 630
  • [25] Developing Java']Java applets for Electrical Machine using beans technology
    Ho, W
    Banh, L
    Jeong, KY
    [J]. ICEMS 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON ELECTRICAL MACHINES AND SYSTEMS, VOLS 1 AND 2, 2003, : 947 - 950
  • [26] Utilization of Java']Java Applets for gear optimization
    Amin, N
    Su, D
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON GEARING, TRANSMISSIONS, AND MECHANICAL SYSTEMS, 2000, : 425 - 433
  • [27] Java']Java applets copy protection by steganography
    Shirali-Shahreza, Mohammad
    [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 388 - 391
  • [28] Rule-based filtering for Java']Java applets
    Iglio, P
    Fraticelli, F
    Giuri, L
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 112 - 119
  • [29] Cracking RC5 with Java']Java applets
    Gladychev, P
    Patel, A
    O'Mahony, D
    [J]. CONCURRENCY-PRACTICE AND EXPERIENCE, 1998, 10 (11-13): : 1165 - 1171
  • [30] Developing Java']Java entertainment applets - Withers,J
    Gillespie, T
    [J]. LIBRARY JOURNAL, 1997, 122 (06) : 118 - 118