Browse > Article

Applet Control using Java Bytecode Modification on the Internet Communication  

김광준 (조선대학교 컴퓨터공학부)
나상동 (조선대학교 컴퓨터공학부)
배용근 (조선대학교 컴퓨터공학부)
Abstract
Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.
Keywords
Java applet; JDK(Java Development Kit); Byiecode Verification; JVM(Java Virtual Machine);
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Gosling, B. Joy, and G. Steele, The Java Language Specification, Menlo Park, Calif.:Addison-Wesley, 1996.
2 J. Gosling, 'The Java Language Environment' Sun Microsystems, 1996
3 Joseph A. Bank, 'Java Security', http://swissnet.ai.mit.edu/-jbank/javapaper/javapaper.html
4 L. Cardelli, J. Donahue, L. Glassman, M. Jordan, B. Kalsow, G. Nelson Modulak, 'Language Definition'. SIGPLAN Notices, 27(8), August 1992.
5 J. Steven Fritzinger, Marianne Mueller, 'Java Security', Sun Microsytems, 1997
6 Dahlia Malkhi, Michael Reiter, Avi Rubin, 'Secure Execution of Java Applets using a Remote Playground'
7 Li Gong, R. Schemers, 'Implementing Protection Domains in the Java Development Kit 1.2', Proceedings of Internet Society Symposium on Network and Distributed System Security: pp.103-112, 1997.
8 G.C. Necula and Peter Lee, 'Safe kernel extensions with runtime checking', In Proceedings of the 2nd Symposium on Operating Systems Design and Implementation, October 1996.
9 Li Gong, 'Java Security Architecture(JDK 1.2)', Sun Microsystems, 1998
10 T. Lindholm and F. Yellin, The Java Virtual Machine Specification, Menlo Park, Calif.:Addison-Wesley, 1997.