Analysis of JAVA']JAVA security and hostile applets

被引:0
|
作者
Brunnstein, K
机构
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Rapid growth of Internet was only possible when document description languages (esp. HTML), exchange protocols (HTTP) and navigation tools such as Netscape's browser and Internet Explorer were available for mass usage. Basic Internet features (protocols, esp. TCP/IP, domain organisation and routing concepts), navigation tools and document description languages have been specified without observing relevant security requirements, esp. concerning confidentiality of sensitive processes and data. Moreover, essential safety aspects - availability, reliability, maintainability, functionality - have also been neglected. As security and safety are ''design-inherent'' features (i.e. they must be specified in design and enforced in implemented systems), later enhancements (such as IP v.6 including authentication and encryption, protocols such as S-HTTP, SSL or SET) can at best reduce risks, but they can NOT cure past design faults. Within this insecure and unsafe Internet environment, ''agent'' technologies develop, which perform net-''work'' with usually small processes which interoperate at an assumed benefit of users. A multitude of agents applications has been discussed, including delegation of tasks, handling email, coordination of group work and scheduling, mobile knowledge robots, distributed searches and many others. Early examples of agent technologies (though not named as such) have been XEROXs worms (which materialized in several network experiements and attacks) and chain letters. Started either automatically or from a users desktop (or better: WebTop), agents work in hidden manners. Therefore, security and safety aspects as well as mechanisms to control agents must be carefully analysed from design to implementation and actual work. JAVA was announced in 1996, by Sun Microsystems (in a ''White Paper'') as 4G-language for Internet applications. It supports development and execution of small agents, called ''applets'' which are executed upon a specific software engine (conceptually similar to Niklaus Wirth's p-Code for Pascal). According to Sun's summary: Java is a simple, object-oriented, distributed, interpreted, robust, secure, architecture neutral, portable, high-performance, multi-threaded, and dynamic language.'' The C++-like JAVA-language has several deliberate restrictions, which according to Sun shall guarantee applet security. Among such restrictions, access to files and Internet address space (URLs) is strictly prohibited, and memory management (including garbage collection) is automatic; user-manipulated pointers are not supported in JAVA. As manipulation of memory (e.g. via memory residence) and manipulation of files are regarded as essential means with which (traditional) viruses propagate, some experts and Sun assume that JAVA viruses are ''impossible''; in a counterposition, others (such as Bill Cheswick) have regarded JAVA as ''ideal virus writing language''. Besides language restrictions, JAVA offers more security features. A special class of services ''security.java'' supports encryption, authentication (digital signatures), secure key exchange and integrity mechanisms (checksumming). On this basis, applets may be authorized and authenticated. This provides a secure channel to the manufacturer which is ''secure'' if and when the manufacturer is regarded trustworthy. An additional feature is that JAVA applets are executed upon ist own interpreter; JAVA code can then be verified for conformance with security prescriptions (byte-code verifier). With these enhancements, JAVA is much better than almost all other language systems though it is inferior to Secure ADA which offers also formal methods for proof of specified features (this is not foreseen in JAVA which does not hide its medium-level origin: it is similar to C/C++). Nevertheless, JAVA applets are far from being ''secure''. First, any hidden manipulation within the scope of the language is possible; it is therefore no surprise that ''hostile applets'' have soon been demonstrated on Internet, ranging from rather ''innocent'' Noisy.Bear'' which ''only'' consumes processor time and memory, to ''Killer-java'' which installs multiple threads and kills some browsers. These applets can be classified as ''malicious trojan horses''; they do NOT replicate but may nevertheless harmfully affect user data and processes.More generally, ''security'' is a feature of a system whithin properly specified boundaries. When JAVA applets execute on insecure systems (ranging from hardware to operationg systems to browsers and file systems), insecure use is possible despite JAVA restrictions. So far, insecure interactions of JAVA applets with browsers (esp. Netscape's) have been discussed (Princeton University). So far, self-reproduction has not been demonstrated. Moreover, essential safety aspects - availability, reliability, maintainability, functionality - have also been neglected in JAVA design. Conclusion: though JAVA has some security features, applets enlarges the risk of agent technologies. Based on insecure systems such as operating systems and browsers, risks of JAVA applets for sensitive information is significant.
引用
收藏
页码:293 / 295
页数:3
相关论文
共 50 条
  • [32] Managing the life cycle of Java']Java Card applets in other Java']Java virtual machines
    Roland, Michael
    Langer, Josef
    Mayrhofer, Rene
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2014, 10 (03) : 291 - +
  • [33] Detecting Attacks on Java']Java Cards by Fingerprinting Applets
    Morana, Giovanni
    Tramontana, Emiliano
    Zito, Daniele
    [J]. 2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 359 - 364
  • [34] Analysis of wireless Java']Java security
    Mahmoud, QH
    Vasiu, L
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 466 - 470
  • [35] Security analysis of mobile Java']Java
    Debbabi, M
    Saleh, M
    Talhi, C
    Zhioua, S
    [J]. Sixteenth International Workshop on Database and Expert Systems Applications, Proceedings, 2005, : 231 - 235
  • [36] Static Code Analysis and Detection of Multiple Malicious Java']Java Applets using SVM
    Salunkhe, Sapana Y.
    Pattewar, Tareek M.
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1538 - 1542
  • [37] Learning Java']Java: a programmed instruction approach using Applets
    Emurian, HH
    Hu, X
    Wang, J
    Durham, AG
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2000, 16 (04) : 395 - 422
  • [38] Interactive graphics toolkit for java']java applications and web applets
    Denbo, DW
    [J]. 17TH INTERNATIONAL CONFERENCE ON INTERACTIVE INFORMATION AND PROCESSING SYSTEMS (IIPS) FOR METEOROLOGY, OCEANOGRAPHY, AND HYDROLOGY, 2001, : 372 - 375
  • [39] EUROMED-JAVA']JAVA: Trusted Third Party Services for securing medical Java']Java applets
    Varvitsiotis, A
    Polemi, D
    Marsh, A
    [J]. COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 209 - 220
  • [40] Educational Java']Java Applets get in power electronics labs
    Canesín, CA
    Gonçalves, FAS
    [J]. 2005 IEEE Power Electronics Education Workshop, 2005, : 34 - 39