Mobile Code Security by Java Bytecode Instrumentation

Gespeichert in:
Bibliographische Detailangaben
Titel: Mobile Code Security by Java Bytecode Instrumentation
Autoren: Ajay Chander, John C. Mitchell, Insik Shin
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Quelle: http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf.
Publikationsjahr: 2001
Bestand: CiteSeerX
Beschreibung: Mobile code provides significant opportunities and risks. Java bytecode is used to provide executable content to web pages and is the basis for dynamic service configuration in the Jini framework. While the Java Virtual Machine includes a bytecode verifier that checks bytecode programs before execution, and a bytecode interpreter that performs run-time tests, mobile code may still behave in ways that are harmful to users. We present techniques that insert runtime tests into Java code, illustrating them for Java applets and Jini proxy bytecodes. These techniques may be used to contain mobile code behavior or, potentially, insert code appropriate to profiling or other monitoring efforts. The main techniques are class modification, involving subclassing non-final classes, and method-level modifications that may be used when control over objects from final classes is desired.
Publikationsart: text
Dateibeschreibung: application/pdf
Sprache: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092; http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf
Verfügbarkeit: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092
http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Dokumentencode: edsbas.C1D7859C
Datenbank: BASE
Beschreibung
Abstract:Mobile code provides significant opportunities and risks. Java bytecode is used to provide executable content to web pages and is the basis for dynamic service configuration in the Jini framework. While the Java Virtual Machine includes a bytecode verifier that checks bytecode programs before execution, and a bytecode interpreter that performs run-time tests, mobile code may still behave in ways that are harmful to users. We present techniques that insert runtime tests into Java code, illustrating them for Java applets and Jini proxy bytecodes. These techniques may be used to contain mobile code behavior or, potentially, insert code appropriate to profiling or other monitoring efforts. The main techniques are class modification, involving subclassing non-final classes, and method-level modifications that may be used when control over objects from final classes is desired.