Browse > Article

A Study on Applet Control on the Internet Communication using Java Bytecode  

김문환 (KTF 네트워크 교환운용팀)
나상동 (조선대학교 컴퓨터공학부)
Abstract
Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.
Keywords
Java Applet; JVM(Java Virtual Machine); JDK(Java Development Kit); Bytecode Verification;
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ J.Gosling ] / The Java Language Environment
2 /
[ Joseph,A.Bank ] / Java Security
3 /
[ T.Lindholm;F.Yellin ] / The Java Virtual Machine Specification
4 Safe Kernel extensions with runtime checking /
[ G.C.Necula;Peter Lee ] / Proceedings of the 2nd Symposium on Operating Systems Design and Implementation
5 Language Definition /
[ L.Cardelli;J.Donahue;L.Glassman;M.Jordan;B.Kalsow;G.Nelson,Modulak ] / SIGPLAN Notices
6 /
[ Dahlia Malkhi;Michael Reiter;Avi Rubin ] / Secure Execution of Java Applets Using a Remote Playground
7 /
[ J.Gosling;B.Joy;G.Steele ] / The Java Language Specification
8 Implementing Protection Domains in the Java Development Kit 1.2 /
[ Li Gong;R.Schemers ] / Proceedings of Internet Society Symposium on Network and Distributed System Security
9 /
[ Li Gong ] / Java Security Architecture(JDK1.2)
10 /
[ J.Steven,Fritzinger;Marianne Mueller ] / Java Security