Mobile Code Security by Java Bytecode Instrumentation
Saved in:
| Title: | Mobile Code Security by Java Bytecode Instrumentation |
|---|---|
| Authors: | Ajay Chander, John C. Mitchell, Insik Shin |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf. |
| Publication Year: | 2001 |
| Collection: | CiteSeerX |
| Description: | Mobile code provides significant opportunities and risks. Java bytecode is used to provide executable content to web pages and is the basis for dynamic service configuration in the Jini framework. While the Java Virtual Machine includes a bytecode verifier that checks bytecode programs before execution, and a bytecode interpreter that performs run-time tests, mobile code may still behave in ways that are harmful to users. We present techniques that insert runtime tests into Java code, illustrating them for Java applets and Jini proxy bytecodes. These techniques may be used to contain mobile code behavior or, potentially, insert code appropriate to profiling or other monitoring efforts. The main techniques are class modification, involving subclassing non-final classes, and method-level modifications that may be used when control over objects from final classes is desired. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092; http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092 http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.C1D7859C |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science