Mobile Code Security by Java Bytecode Instrumentation

Saved in:
Bibliographic Details
Title: Mobile Code Security by Java Bytecode Instrumentation
Authors: Ajay Chander, John C. Mitchell, Insik Shin
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf.
Publication Year: 2001
Collection: CiteSeerX
Description: Mobile code provides significant opportunities and risks. Java bytecode is used to provide executable content to web pages and is the basis for dynamic service configuration in the Jini framework. While the Java Virtual Machine includes a bytecode verifier that checks bytecode programs before execution, and a bytecode interpreter that performs run-time tests, mobile code may still behave in ways that are harmful to users. We present techniques that insert runtime tests into Java code, illustrating them for Java applets and Jini proxy bytecodes. These techniques may be used to contain mobile code behavior or, potentially, insert code appropriate to profiling or other monitoring efforts. The main techniques are class modification, involving subclassing non-final classes, and method-level modifications that may be used when control over objects from final classes is desired.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092; http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.1092
http://www.cis.upenn.edu/~ishin/htmls/./papers/discex.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.C1D7859C
Database: BASE
Be the first to leave a comment!
You must be logged in first